Research Outputs

Peer-Reviewed Journal Papers

Elsden, C., Chatting, C., Duggan, M., Dwyer, A., and Thornton, P. (2022). Zoom Obscura: Counterfunctional Design for Video-Conferencing. In CHI Conference on Human Factors in Computing Systems. ACM. *Awarded ‘Best Paper’.

Topping, C., Dwyer, A., Michalec, O., Craggs, B., and Rashid, A. (2021). “Beware Suppliers Bearing Gifts!: Analysing Coverage of Supply Chain Cyber Security in Critical National Infrastructure Sectorial and Cross-Sectorial Frameworks.” Computers & Security 108 (102324).

Dwyer, A.C. (2021). “Cybersecurity’s Grammars: A More‐than‐Human Geopolitics of Computation.” Area. Online First.

Lorimer, J., Hodgetts, T., Grenyer, R., Greenhough, B., McLeod, C. and Dwyer, A. (2019). “Making the microbiome public: Participatory experiments with DNA sequencing in domestic kitchens.” Transactions of the Institute of British Geographers, 44 (3): 524 – 541.

Greenhough, B., Dwyer, A., Grenyer, R., Hodgetts, T., McLeod, C. and Lorimer, J. (2018). “Unsettling antibiosis: how might interdisciplinary researchers generate a feeling for the microbiome and to what effect?Palgrave Communications, 4(1): 149.

Hodgetts, T., Grenyer, R., Greenhough, B., McLeod, C., Dwyer, A. and Lorimer, J. (2018). “The microbiome and its publics: A participatory approach for engaging publics with the microbiome and its implications for health and hygiene.” EMBO reports, 19(6).


Devanny, J., Dwyer, A., Ertan, A., & Stevens, T. (2021). “The National Cyber Force that Britain Needs?” Cyber Security Research Group / Offensive Cyber Working Group / The Policy Institute . London, King’s College London.

[Contributor] Rashid, A., Hankin, C., & Schneider, S. (2020). “The future of the UK’s Cyber Security Research Position in the World.”

Dwyer, A. (2015). “UK Academic Cyber Security Research: Best Practice for Commercialisation (Short Report).”University of Oxford. Report for the UK Department for Business, Innovation and Skills (BIS).

Dwyer, A. (2015). “UK Academic Cyber Security Research: Best Practice for Commercialisation.”University of Oxford. Report for the UK Department for Business, Innovation and Skills (BIS).

PhD (DPhil) Thesis

Dwyer, A. C. (2019). Malware Ecologies: A Politics of Cybersecurity (University of Oxford).


Dwyer, A. C. (2022, Forthcoming). “A Foundry of Artificial Intelligence? The case of UK national security.” In Romaniuk, S. N., and Manjikian. M. (Eds). Routledge Companion to Artificial Intelligence and National Security Policy. Routledge.

O’Grady, N., and Dwyer, A.C. (2020). “Cyber Security.” In: Kobayashi, A. (Ed.), International Encyclopedia of Human Geography (Second Edition). Elsevier, Oxford, pp. 135–141. Pre-Print.

Working Papers

Dwyer, A. C., Hallett, J., Peersman, C., Edwards, M., Davidson, B. I., and Rashid, A. (2022). How darknet market users learned to worry more and love PGP: Analysis of security advice on darknet marketplacesarXiv preprint arXiv:2203.08557.

Patnaik, N., Dwyer, A. C., Hallett, J., & Rashid, A. (2021). “Don’t forget your classics: Systematizing 45 years of Ancestry for Security API Usability Recommendations.” arXiv preprint arXiv:2105.02031.

Book Reviews

Dwyer, A.C., O’Grady, N., Thornton, P., Straube, T., Gilbert, E., and Amoore, L. (2021). “Cloud Ethics: Algorithms and the Attributes of Ourselves and Others.” The AAG Review of Books 9(3): 36–49.


Dwyer, A.C. (2021). “Why ‘Cyber Pearl Harbor’ matters for democracy.” The Alert (Offensive Cyber Working Group).

Dwyer, A., 2021. Is the National Cyber Force for Good? Fabians’ Defence and Security.

Dwyer, A.C. (2020). “Algorithms Don’t Make Decisions!Digital Societies (Bristol University).

COVID-19 alters focus of cyberespionage,” Oxford Analytica (11 June 2020).

Dwyer, A., and Silomon, J. (2019). “Dangerous Gaming: Cyber-Attacks, Air-Strikes and Twitter.” E-International Relations

Dwyer, A. (2018). “The NHS cyber-attack: A look at the complex environmental conditions of WannaCry.” RAD Magazine, 44, 512: 25-26. Pre-Print.

Dwyer, A. (2015). “Future Fossils: The Pacemaker.” [Online] Society and Space (Open Site).

Invited Talks

Open Data Institute (ODI) Summit 2021, Online.
Roundtable participant with Dr Pip Thornton and Ghislaine Boddington, “Bodies of Data: Who owns us?” (2 November 2021).

Prague Security Studies Institute’s Cyber Security Academy, Prague, Czechia.
Guest Lecture, “An Offensive World: The Changing Terrain of Cyber Conflict,” (6 October 2021). 

Critical Legal Conference, Dundee, UK.
Plenary speaker, “Dr Canonical – Plenary Panel on Life, Technology, and Capital, ” (4 September 2021).

Digital Geographies Research Group (RGS-IBG), UK.
Panellist, “Where next for Digital Geographies? Pathways and prospects,” (14 July 2021).

King’s College London Cyber Security Research Group, UK.: Guest Lecture, “Deciding on Choice: Cybersecurity, Politics and (Cyber) War,” (7 November 2019).

Dynamics of Security, Collaborative Research Centre, Marburg, Germany: Guest Lecture, “Computational (re)cognition: new political actors security studies,” (21 May 2019).

Environmental Change Institute, University of Oxford, UK.: Speaker, “Securing the ‘Smart’ Grid,” (31 May 2018). Slides available here.

Cyber Security Seminar, Department of Computer Science, University of Oxford Oxford, UK.: Speaker, “Malware Ecologies: Exploring the Geographies of Cybersecurity,” (15 December 2017).

UK Radiological and Radiation Oncology Congress (UKRCO) Manchester, UK.: Panellist, “What happened to the NHS? (Overview of the malicious software, why it happened, and are we at risk of it happening again?),” (12 June 2017).

Conference Presentations

The Unknowable Conflict: Tracing AI, Recognition, and the Death of the (Human) Loop.” Artificial Intelligence and International Conflict in Cyberspace. Hague Cyber Norms / Géode. The Hague / Online. 24 September 2021.

“Examining Stasis, Exuding Performance: The role of the Huawei Cyber Security Evaluation Centre (HCSEC) in the performative securities of 5G.” Session: Bordering 5G Futures: Geographies of Infrastructure, Data, and Media. RGS-IBG Annual Conference. Online. 1 September 2021.

Computational terrains: Composing the ecologies of malicious software.” Session: Computational Ecologies. Online Workshop: Digital Ecologies. 29 March 2021.

Data Obscura: cutting through the digital economy.” With P. Thornton. Session: Cutting Together-Apart: Creative and critical practices as agential cuts within digital economies. Dark Eden Conference. Online. 6 November 2020.

“Curative Anomalies: Computational Imaginaries of ‘Automated’ Security.” Re-Imagining Security: Between Science, Technology and Fiction. Online Workshop. 2 July 2020.

“Can the Computer Speak? Implications for More-than-Human Futures.” Social-Technological and Medical Imaginaries. Topologies of Security: Critical Security Studies in Postcolonial and Postsocialist Scenes. Dynamics of Security [Online]: Gießen, Germany. 29 June 2020.

“(Re)Cognizing War.” Global Politics in the Era of Disruptive Technologies: New Scenarios in an Old World? Standing Group di Relazioni Internazionali (SGRI) Conference, Società Italiana di Scienza Politica: Trento, Italy. 13 June 2019.

“(Re)Cognising Computation: New Political Actors in Security Studies.” Guest Lecture at SFB-TRR 138 ‘Dynamics of Security.’ Marburg, Germany. 28 May 2019.

“Anomalous Structures.” Finance, security, infrastructure – hegemonies in generative practices. Dynamics of Security,  SFB-TRR 138; Gießen, Germany. 21 – 22 March 2019.

“Approaching Computation in Political Geography.” New Frontiers in Political Geography. University of Oxford; Oxford, UK. 25 September 2018.

“Negotiating maliciousness: The (Auto)Ethnographic “Becoming-Analyst.” S30W: Ethnographies of Technologies & the Security State. European International Studies Association Pan-European Conference (EISAPEC); Prague, Czech Republic. 15 September 2018.

“Automating the laboratory? Folding securities of malware.” New Geographies of Automation? (2): Spacings. RGS-IBG Annual Conference; Cardiff, UK. 29 August 2018.

“Rethinking Space in Cybersecurity.” Smart Cities. CDT in Cyber Security Student Conference; Royal Holloway, University of London, Egham, UK. 4 May 2018.

“The Malicious Transience: a malware ecology.” Machinic Encounters. Transient Topographies: Space and Interface in Literature and Art Conference; NUI Galway, Ireland. 21 April 2018.

“Maliciously corrupting spaces of the (non)object.” Geography’s Technology: Conceptualising technology, technics and the technological (2): Technicity. RGS-IBG Annual Conference; London, UK. 31 August 2017.

“Place-faking: fermenting resistance through digital productions of space” with J. Shaw. The Museum of Contemporary Commodities: creative propositions and provocations on the heritages of data-trade-place-value. RGS-IBG Annual Conference. London, UK. 1 September 2017.

“Situating Cyberspace(s): Ethnography as Depth.” Of Other Cybersecurities, Royal Holloway, University of London; Egham, UK. 15 June 2017.

“A More-than-Human Security: Performances of a Malware Politics.” Exploring the Modular, Material and Performative Politics of Security. Association of American Geographers Annual Meeting. Boston, USA. 8 April 2017.

“A Model for Future Security Cooperation: ICANN and the Conficker Working Group.” ICANN56. Helsinki, Finland. 26 July 2016.

“The kiss of death: an algorithmic curse.” Living with Algorithms Workshop. Royal Holloway, University of London. London, UK. 9 June 2016.

“W32.Stuxnet: An Olympic Games.” Moving Together – Exploring the nexus between disparate approaches to movement. Durham University. Durham, UK. 4 May 2016.

“The Pacemaker: Tracing cyber (re)territorialisations.” Future Fossils? Specimens from the 5th millennium “Return to Earth” expedition. RGS-IBG Annual Conference. Exeter, UK. 3 September 2015.



LBC Radio, Andrew Pierce: 7-minute interview on cyber-espionage, COVID-19, and Russia hacking in light of a joint claim by UK, USA, and Canada, (17 July 2020). Full episode: Forthcoming. Recorded segment available here…

BBC World Service, World Business Report: Interview with Mike Johnson in a special report on security concerns of teleconferencing software during COVID-19, in particular Zoom, (6 April 2020). Full episode: Coronavirus: can selfies be used for surveillance?

LBC Radio, Nick Ferrari At Breakfast: Expert discussing the UK Labour Party ‘cyber-attack’, (13 November 2019).

BBC Radio 4, You & YoursCybersecurity expert answering questions from general public on specific issues and general guidance, (3 November 2015, 1215 – 1300). Full episode: Call You and Yours: Internet Safety.

Newspapers & Magazines

VOA Chinese: Quotes, “英国发表网络新战略 网络部队据信会以攻为守打击中方黑客力量 [The UK publishes a new cyber strategy, cyber forces are believed to be attacking Chinese hacker forces with offense as defense],” (16 December 2021).

ZDNet: Quote, “Cyber strength now key to national security, says UK,” (17 March 2021). 

The Telegraph: Quote, “Who is listening to your Zoom call? Concerns grow over app’s security,” (27 March 2020).

New Scientist: Quote, “Google restricts Huawei’s use of Android,” (25 May 2019, p.7).

BBC News (Online):

  1. Quotes on British Airways and Magecart, “British Airways breach: How did hackers get in?,” (7 September 2018); “British Airways: Suspect code that hacked fliers ‘found’,” (11 September 2018).
  2. Quote on Facebook and malicious plugins, “Facebook sues over ‘data-grabbing’ quizzes,” (11 March 2019).