Seguir
Andrew Dwyer
Andrew Dwyer
Lecturer in Information Security | Royal Holloway, University of London
Email confirmado em rhul.ac.uk - Página inicial
Título
Citado por
Citado por
Ano
Unsettling antibiosis: how might interdisciplinary researchers generate a feeling for the microbiome and to what effect?
B Greenhough, A Dwyer, R Grenyer, T Hodgetts, C McLeod, J Lorimer
Palgrave Communications 4 (1), 1-12, 2018
472018
Beware suppliers bearing gifts!: Analysing coverage of supply chain cyber security in critical national infrastructure sectorial and cross-sectorial frameworks
C Topping, A Dwyer, O Michalec, B Craggs, A Rashid
Computers & Security 108, 102324, 2021
332021
The NHS cyber-attack: A look at the complex environmental conditions of WannaCry
A Dwyer
RAD Magazine 44, 25-26, 2018
282018
Making the microbiome public: participatory experiments with DNA sequencing in domestic kitchens
J Lorimer, T Hodgetts, R Grenyer, B Greenhough, C McLeod, A Dwyer
Transactions of the Institute of British Geographers 44 (3), 524-541, 2019
272019
The microbiome and its publics: A participatory approach for engaging publics with the microbiome and its implications for health and hygiene
T Hodgetts, R Grenyer, B Greenhough, C McLeod, A Dwyer, J Lorimer
EMBO reports 19 (6), e45786, 2018
232018
Cybersecurity’s grammars: A more‐than‐human geopolitics of computation
AC Dwyer
Area 55 (1), 10-17, 2023
192023
The National Cyber Force that Britain Needs?
J Devanny, A Dwyer, A Ertan, T Stevens
kcl.ac.uk/policy-institute/assets/the-national-cyber-force-that-britain …, 2021
142021
Zoom obscura: Counterfunctional design for video-conferencing
C Elsden, D Chatting, M Duggan, AC Dwyer, P Thornton
Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems …, 2022
102022
What Can a Critical Cybersecurity Do?
AC Dwyer, C Stevens, LP Muller, M Dunn Cavelty, L Coles-Kemp, ...
International Political Sociology, 2022
102022
Malware Ecologies: A Politics of Cybersecurity
AC Dwyer
University of Oxford, 2019
82019
Dangerous Gaming: Cyber-Attacks, Air-Strikes and Twitter
AC Dwyer, J Silomon
E-International Relations (www.e-ir.info), 2019
42019
SLR: from saltzer and schroeder to 2021… 47 years of research on the development and validation of security API recommendations
N Patnaik, A Dwyer, J Hallett, A Rashid
ACM Transactions on Software Engineering and Methodology 32 (3), 1-31, 2023
32023
Topologies of security: inquiring in/security across postcolonial and postsocialist scenes
AC Dwyer, A Langenohl, P Lottholz
Critical Studies on Security 11 (1), 1-13, 2023
22023
Cloud Ethics: Algorithms and the Attributes of Ourselves and Others: Louise Amoore. Durham, NC: Duke University Press, 2020. 232 pp. 25.95paper(ISBN9781478008316); 99.95 cloth …
AC Dwyer, N O’Grady, P Thornton, T Straube, E Gilbert, L Amoore
The AAG Review of Books 9 (3), 36-49, 2021
22021
Don't forget your classics: Systematizing 45 years of Ancestry for Security API Usability Recommendations
N Patnaik, AC Dwyer, J Hallett, A Rashid
arXiv preprint arXiv:2105.02031, 2021
22021
Cyber Security
N O'Grady, AC Dwyer
International Encyclopedia of Human Geography 2, 135-141, 2020
22020
How darknet market users learned to worry more and love PGP: Analysis of security advice on darknet marketplaces
AC Dwyer, J Hallett, C Peersman, M Edwards, BI Davidson, A Rashid
arXiv preprint arXiv:2203.08557, 2022
12022
Algorithms Don't Make Decisions!
A Dwyer
Digital Societies, 2020
12020
From Cyber Security to Cyber Power: Appraising the Emergence of ‘Responsible, Democratic Cyber Power’in UK Strategy
J Devanny, AC Dwyer
2023 15th International Conference on Cyber Conflict: Meeting Reality (CyCon …, 2023
2023
The unknowable conflict: Tracing AI, recognition, and the death of the (human) loop
AC Dwyer
Artificial Intelligence and International Conflict in Cyberspace, 2, 2023
2023
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20