2024
- Barrinha, André. 2024. Cyber-diplomacy: The Emergence of a Transient Field. Hague Journal of Diplomacy, 1-28. https://doi.org/10.1163/1871191x-bja10183
- Cristiano, Fabio, Kurowska, Xymena, Stevens, Tim, Hurel, Louise Marie, Fouad, Noran, Dunn Cavelty, Myriam, Broeders, Dennis, Liebetrau, Tobias and Shires, James. 2024. Cybersecurity and the politics of knowledge production: Towards a reflexive practice. Journal of Cyber Policy. https://doi.org/10.1080/23738871.2023.2287687
- Dwyer, Andrew. 2024. “The Recursive, Geopolitical, and Infrastructural Expertise of Malware Analysis and Detection.” In The Practices and Politics of Cybersecurity Expertise, edited by Rebecca Slayton and Lilly Muller. Vol. Policy Roundtable III-4. H-Diplo, 33 – 38. https://issforum.org/ISSF/PDF/RJISSF-Policy-Roundtable-III-4.pdf
- Haggman, Andreas. 2024. Playful Learning about Cybersecurity. In: Smith III, Frank L., Kollars, Nina A. & Schechter, Benjamin H. (eds) Cyber Wargaming: Research and Education for Security in a Dangerous Digital World. Georgetown University Press. 109-123
- Katagiri, Nori. 2024. “Advanced Persistent Threats and the “Big Four”: State-Sponsored Hackers in China, Iran, Russia, and North Korea in 2003-2021,” Comparative Strategy, Vol. 43, No. 3
- Katagiri, Nori. “Between cyber retaliation and escalation: Explaining variation in state response to cyber attack,” Politics & Policy (2024, https://onlinelibrary.wiley.com/doi/10.1111/polp.12590?af=R
- Katagiri, Nori. How liberal democracies defend their cyber networks from hackers: Strategies of deterrence, Palgrave Macmillan (2024), https://link.springer.com/book/10.1007/978-3-031-54561-0
-
Stevens, Tim. 2024. Cybersecurity. In: Rossi, N. & Riemann, M. (eds) Security Studies: An Applied Introduction. Sage, 353-373.
-
Stevens, Tim and Devanny, Joe (eds). 2024. Research Handbook on Cyberwarfare. Edward Elgar.
- Weir, C., Dyson, A., Jogunola, O., Dennis, L., Paxton-Fear, K. 2024. Interlinked Computing in 2040: Safety, Truth, Ownership and Accountability. In: Computer. 57, 1, p. 59-68. 9 p.
2023
- Burton, Joe and Stevens,Tim. 2023. System, alliance, domain: a three-frame analysis of NATO’s contribution to cyber stability. In: R. Chesney, J. Shires & M. Smeets (eds) Cyberspace and Instability. Edinburgh University Press, 129-152. https://doi.org/10.1515/9781399512510-007
- Cheetham, Kim and Michalec, Ola. 2023. Home alone?: Exploring the geographies of digitally-mediated privacy practices at home during the COVID-19 pandemic
- Chowdhury, Partha Das, Coles-Kemp, Lizzie, Follis, Karolina, Milivojevic, Sanja, Rashid, Awais, Liveley, Genevieve, Netto, Gina, Dominguez, Andres, Anderson, Ross, Ramokapane, Kopo Marvin and Michalec, Ola. 2023. From Utility to Capability: A Manifesto for Equitable Security and Privacy for All
- Csenkey, Kristen and Nina Bindel. 2023. “Post-quantum cryptographic assemblages and the governance of the quantum threat”, Journal of Cybersecurity 9 (1): 1-14. https://doi.org/10.1093/cybsec/tyad001
- Devanny, Joe, and Andrew Dwyer. 2023. “From Cyber Security to Cyber Power: Appraising the Emergence of ‘Responsible, Democratic Cyber Power’ in UK Strategy.” In 15th International Conference on Cyber Conflict Meeting Reality, edited by T Jančárková, D Giovannelli, K Podiņš, and I Winther, 381–97. International Conference on Cyber Conflict (CyCon). NATO Cooperative Cyber Defence Centre of Excellence (CCDCoE). https://www.ccdcoe.org/uploads/doc/CyCon_2023_book_print.pdf
- Domínguez Hernández, Andrés , Ramokapane, Kopo M, Das Chowdhury, Partha, Michalec, Ola, Johnstone, Emily, Godwin, Emily, Cork, and Rashid, Awais. 2023. Co-creating a Transdisciplinary Map of Technology-mediated Harms, Risks and Vulnerabilities: Challenges, ambivalences and opportunities. Proceedings of the ACM on Human-Computer Interaction
- Dwyer, Andrew C. 2023a. “Cybersecurity’s Grammars: A More-than-Human Geopolitics of Computation.” Area 55 (1): 10–17. https://doi.org/10.1111/area.12728
- Dwyer, Andrew C. 2023b. “The Unknowable Conflict: Tracing AI, Recognition, and the Death of the (Human) Loop.” In Artificial Intelligence and International Conflict in Cyberspace, edited by Dennis Broeders, Fabio Cristiano, François Delerue, Frédérick Douzet, and Aude Géry, 1st ed., 19–46. Routledge. https://doi.org/10.4324/9781003284093-3
- Dwyer, Andrew C, Kathrin Moog, Jantje Silomon, and Mischa Hansel. 2023. “On the Use and Strategic Implications of Cyber Ranges in Military Contexts: A Dual Typology.” ICCWS 2023 18th International Conference on Cyber Warfare and Security 18 (1). https://doi.org/10.34190/iccws.18.1.981
- Dwyer, Andrew, Andreas Langenohl, and Philipp Lottholz. 2023. “Topologies of Security: Inquiring In/Security Across Postcolonial and Postsocialist Scenes.” Critical Studies on Security 11 (1): 1–13. https://doi.org/10.1080/21624887.2023.2208942
- Michalec, Ola, Barker, Kim, Coopamootoo, Kovila, Coventry, Lynne, Duppresoir, Francois, Edwards, Matthew, Johnson, Shane, Johnstone, Emily, Jurasz, Olga, Mehrnezhad, Maryam, Moncur, Wendy, Ridout, Frances, Stevens, Francesca, Strothmayer, Angelika and Tanczer, Leonie. 2023. Towards a research agenda: tackling violence against women and girls online.
- Michalec, Ola, Shreeve, Ben and Rashid, Awais. 2023. Who will keep the lights on? Expertise and inclusion in cyber security visions of future energy systems. Energy Research & Social Science 106, 103327
- Spencer, M. and Pizio, D., 2023. The de-perimeterisation of information security: The Jericho Forum, zero trust, and narrativity. Social Studies of Science. https://doi.org/10.1177/03063127231221107
-
Stevens, Tim and Burton, Joe. 2023. NATO and strategic competition in cyberspace. NATO Review. https://www.nato.int/docu/review/articles/2023/06/06/nato-and-strategic-competition-in-cyberspace/index.html
-
Stevens, Tim. 2023. What is Cybersecurity For? Bristol University Press. https://doi.org/10.2307/jj.1544765
-
Stevens, Tim, Cormac, Rory, Lonergan, Erica, Huesch, Pia and Devanny, Joe. 2023. Evaluating the National Cyber Force’s ‘Responsible Cyber Power in Practice’. RUSI Commentary. https://rusi.org/explore-our-research/publications/commentary/evaluating-national-cyber-forces-responsible-cyber-power-practice
- Weir, C., Becker, I., Blair, L. 2023. Incorporating Software Security: Using Developer Workshops to Engage Product Managers. In: Empirical Software Engineering. 28, 2, 33 p.
- Weir, C., Dyson, A., Prince, D. 2023. A Lot Less Likely Than I Thought: Introducing Evidence-Based Security Risk Assessment for Healthcare Software
- Weir, C., Dyson, A., Prince, D. 2023. Do You Speak Cyber?: Talking Security with Developers of Health Systems and Devices. In: IEEE Security and Privacy Magazine. 21, 1, p. 27-36. 10 p.