Follow
Andrew Dwyer
Andrew Dwyer
Lecturer in Information Security | Royal Holloway, University of London
Verified email at rhul.ac.uk - Homepage
Title
Cited by
Cited by
Year
Unsettling antibiosis: how might interdisciplinary researchers generate a feeling for the microbiome and to what effect?
B Greenhough, A Dwyer, R Grenyer, T Hodgetts, C McLeod, J Lorimer
Palgrave Communications 4 (1), 1-12, 2018
532018
Beware suppliers bearing gifts!: Analysing coverage of supply chain cyber security in critical national infrastructure sectorial and cross-sectorial frameworks
C Topping, A Dwyer, O Michalec, B Craggs, A Rashid
Computers & Security 108, 102324, 2021
382021
Making the microbiome public: participatory experiments with DNA sequencing in domestic kitchens
J Lorimer, T Hodgetts, R Grenyer, B Greenhough, C McLeod, A Dwyer
Transactions of the Institute of British Geographers 44 (3), 524-541, 2019
372019
The NHS cyber-attack: A look at the complex environmental conditions of WannaCry
A Dwyer
RAD Magazine 44, 25-26, 2018
292018
The microbiome and its publics: a participatory approach for engaging publics with the microbiome and its implications for health and hygiene
T Hodgetts, R Grenyer, B Greenhough, C McLeod, A Dwyer, J Lorimer
EMBO reports 19 (6), e45786, 2018
252018
Cybersecurity’s grammars: A more‐than‐human geopolitics of computation
AC Dwyer
Area 55 (1), 10-17, 2023
212023
What Can a Critical Cybersecurity Do?
AC Dwyer, C Stevens, LP Muller, M Dunn Cavelty, L Coles-Kemp, ...
International Political Sociology, 2022
192022
The National Cyber Force that Britain Needs?
J Devanny, A Dwyer, A Ertan, T Stevens
kcl.ac.uk/policy-institute/assets/the-national-cyber-force-that-britain …, 2021
182021
Zoom obscura: Counterfunctional design for video-conferencing
C Elsden, D Chatting, M Duggan, AC Dwyer, P Thornton
Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems …, 2022
142022
Malware Ecologies: A Politics of Cybersecurity
AC Dwyer
University of Oxford, 2019
102019
SLR: from saltzer and schroeder to 2021… 47 years of research on the development and validation of security API recommendations
N Patnaik, A Dwyer, J Hallett, A Rashid
ACM Transactions on Software Engineering and Methodology 32 (3), 1-31, 2023
62023
Dangerous Gaming: Cyber-Attacks, Air-Strikes and Twitter
AC Dwyer, J Silomon
E-International Relations (www.e-ir.info), 2019
42019
Algorithms Don't Make Decisions!
A Dwyer
Digital Societies, 2020
32020
The unknowable conflict: Tracing AI, recognition, and the death of the (human) loop
AC Dwyer
Artificial Intelligence and International Conflict in Cyberspace, 2, 2023
22023
Topologies of security: inquiring in/security across postcolonial and postsocialist scenes
AC Dwyer, A Langenohl, P Lottholz
Critical Studies on Security 11 (1), 1-13, 2023
22023
How darknet market users learned to worry more and love PGP: Analysis of security advice on darknet marketplaces
AC Dwyer, J Hallett, C Peersman, M Edwards, BI Davidson, A Rashid
arXiv preprint arXiv:2203.08557, 2022
22022
Cloud Ethics: Algorithms and the Attributes of Ourselves and Others: Louise Amoore. Durham, NC: Duke University Press, 2020. 232 pp. 25.95paper(ISBN9781478008316); 99.95 cloth …
AC Dwyer, N O’Grady, P Thornton, T Straube, E Gilbert, L Amoore
The AAG Review of Books 9 (3), 36-49, 2021
22021
Don't forget your classics: Systematizing 45 years of Ancestry for Security API Usability Recommendations
N Patnaik, AC Dwyer, J Hallett, A Rashid
arXiv preprint arXiv:2105.02031, 2021
22021
Cyber Security
N O'Grady, AC Dwyer
International Encyclopedia of Human Geography 2, 135-141, 2020
22020
On the Use and Strategic Implications of Cyber Ranges in Military Contexts: A Dual Typology
AC Dwyer, K Moog, J Silomon, M Hansel
ICCWS 2023 18th International Conference on Cyber Warfare and Security, 2023
12023
The system can't perform the operation now. Try again later.
Articles 1–20