Follow
Andrew Dwyer
Andrew Dwyer
Lecturer in Information Security | Royal Holloway, University of London
Verified email at rhul.ac.uk - Homepage
Title
Cited by
Cited by
Year
Unsettling antibiosis: how might interdisciplinary researchers generate a feeling for the microbiome and to what effect?
B Greenhough, A Dwyer, R Grenyer, T Hodgetts, C McLeod, J Lorimer
Palgrave Communications 4 (1), 1-12, 2018
482018
Beware suppliers bearing gifts!: Analysing coverage of supply chain cyber security in critical national infrastructure sectorial and cross-sectorial frameworks
C Topping, A Dwyer, O Michalec, B Craggs, A Rashid
Computers & Security 108, 102324, 2021
332021
Making the microbiome public: participatory experiments with DNA sequencing in domestic kitchens
J Lorimer, T Hodgetts, R Grenyer, B Greenhough, C McLeod, A Dwyer
Transactions of the Institute of British Geographers 44 (3), 524-541, 2019
282019
The NHS cyber-attack: A look at the complex environmental conditions of WannaCry
A Dwyer
RAD Magazine 44, 25-26, 2018
282018
The microbiome and its publics: A participatory approach for engaging publics with the microbiome and its implications for health and hygiene
T Hodgetts, R Grenyer, B Greenhough, C McLeod, A Dwyer, J Lorimer
EMBO reports 19 (6), e45786, 2018
232018
Cybersecurity’s grammars: A more‐than‐human geopolitics of computation
AC Dwyer
Area 55 (1), 10-17, 2023
192023
The National Cyber Force that Britain Needs?
J Devanny, A Dwyer, A Ertan, T Stevens
kcl.ac.uk/policy-institute/assets/the-national-cyber-force-that-britain …, 2021
132021
Zoom obscura: Counterfunctional design for video-conferencing
C Elsden, D Chatting, M Duggan, AC Dwyer, P Thornton
Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems …, 2022
102022
What Can a Critical Cybersecurity Do?
AC Dwyer, C Stevens, LP Muller, M Dunn Cavelty, L Coles-Kemp, ...
International Political Sociology, 2022
102022
Malware Ecologies: A Politics of Cybersecurity
AC Dwyer
University of Oxford, 2019
82019
Dangerous Gaming: Cyber-Attacks, Air-Strikes and Twitter
AC Dwyer, J Silomon
E-International Relations (www.e-ir.info), 2019
42019
SLR: from saltzer and schroeder to 2021… 47 years of research on the development and validation of security API recommendations
N Patnaik, A Dwyer, J Hallett, A Rashid
ACM Transactions on Software Engineering and Methodology 32 (3), 1-31, 2023
32023
Topologies of security: inquiring in/security across postcolonial and postsocialist scenes
AC Dwyer, A Langenohl, P Lottholz
Critical Studies on Security 11 (1), 1-13, 2023
22023
Cloud Ethics: Algorithms and the Attributes of Ourselves and Others: Louise Amoore. Durham, NC: Duke University Press, 2020. 232 pp. 25.95paper(ISBN9781478008316); 99.95 cloth …
AC Dwyer, N O’Grady, P Thornton, T Straube, E Gilbert, L Amoore
The AAG Review of Books 9 (3), 36-49, 2021
22021
Don't forget your classics: Systematizing 45 years of Ancestry for Security API Usability Recommendations
N Patnaik, AC Dwyer, J Hallett, A Rashid
arXiv preprint arXiv:2105.02031, 2021
22021
Cyber Security
N O'Grady, AC Dwyer
International Encyclopedia of Human Geography 2, 135-141, 2020
22020
How darknet market users learned to worry more and love PGP: Analysis of security advice on darknet marketplaces
AC Dwyer, J Hallett, C Peersman, M Edwards, BI Davidson, A Rashid
arXiv preprint arXiv:2203.08557, 2022
12022
Algorithms Don't Make Decisions!
A Dwyer
Digital Societies, 2020
12020
From Cyber Security to Cyber Power: Appraising the Emergence of ‘Responsible, Democratic Cyber Power’in UK Strategy
J Devanny, AC Dwyer
2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon …, 2023
2023
The unknowable conflict: Tracing AI, recognition, and the death of the (human) loop
AC Dwyer
Artificial Intelligence and International Conflict in Cyberspace, 2, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20