Lorimer, J., Hodgetts, T., Grenyer, R., Greenhough, B., McLeod, C. and Dwyer, A., 2019. “Making the microbiome public: Participatory experiments with DNA sequencing in domestic kitchens.” Transactions of the Institute of British Geographers, 44 (3): 524 – 541.Making the microbiome public: Participatory experiments with DNA sequencing in domestic kitchens
Greenhough, B., Dwyer, A., Grenyer, R., Hodgetts, T., McLeod, C. and Lorimer, J., 2018. “Unsettling antibiosis: how might interdisciplinary researchers generate a feeling for the microbiome and to what effect?” Palgrave Communications, 4(1): 149.The microbiome and its publics: A participatory approach for engaging publics with the microbiome and its implications for health and hygiene
Hodgetts, T., Grenyer, R., Greenhough, B., McLeod, C., Dwyer, A. and Lorimer, J., 2018. “The microbiome and its publics: A participatory approach for engaging publics with the microbiome and its implications for health and hygiene.” EMBO reports, 19(6).Unsettling antibiosis: how might interdisciplinary researchers generate a feeling for the microbiome and to what effect?
PhD (DPhil) Thesis
Dwyer, A. C. (2019). Malware Ecologies: A Politics of Cybersecurity (University of Oxford).
Blog Posts and Magazines
Dwyer, A.C., 2020. “Algorithms Don’t Make Decisions!” Digital Societies (Bristol University).
Dwyer, A., and Silomon, J. 2019. “Dangerous Gaming: Cyber-Attacks, Air-Strikes and Twitter.” E-International Relations.
Dwyer, A. 2018. “The NHS cyber-attack: A look at the complex environmental conditions of WannaCry.” RAD Magazine, 44, 512: 25-26. Pre-Print.
Dwyer, A. (2015). “Future Fossils: The Pacemaker.” [Online] Society and Space (Open Site).
[Contributor] Rashid, A., Hankin, C., & Schneider, S. (2020). “The future of the UK’s Cyber Security Research Position in the World.”
Dwyer, A. (2015). “UK Academic Cyber Security Research: Best Practice for Commercialisation (Short Report).” University of Oxford. Report for the UK Department for Business, Innovation and Skills (BIS).
Dwyer, A. (2015). “UK Academic Cyber Security Research: Best Practice for Commercialisation.” University of Oxford. Report for the UK Department for Business, Innovation and Skills (BIS).
King’s College London Cyber Security Research Group, UK.: Guest Lecture, “Deciding on Choice: Cybersecurity, Politics and (Cyber) War,” (7 November 2019).
Dynamics of Security, Collaborative Research Centre, Marburg, Germany: Guest Lecture, “Computational (re)cognition: new political actors security studies,” (21 May 2019).
Environmental Change Institute, University of Oxford, UK.: Speaker, “Securing the ‘Smart’ Grid,” (31 May 2018). Slides available here.
Cyber Security Seminar, Department of Computer Science, University of Oxford Oxford, UK.: Speaker, “Malware Ecologies: Exploring the Geographies of Cybersecurity,” (15 December 2017).
UK Radiological and Radiation Oncology Congress (UKRCO) Manchester, UK.: Panelist, “What happened to the NHS? (Overview of the malicious software, why it happened, and are we at risk of it happening again?),” (12 June 2017).
LBC Radio, Andrew Pierce: 7-minute interview on cyber-espionage, COVID-19, and Russia hacking in light of a joint claim by UK, USA, and Canada, (17 July 2020). Full episode: Forthcoming. Recorded segment available here…
BBC World Service, World Business Report: Interview with Mike Johnson in a special report on security concerns of teleconferencing software during COVID-19, in particular Zoom, (6 April 2020). Full episode: Coronavirus: can selfies be used for surveillance?
LBC Radio, Nick Ferrari At Breakfast: Expert discussing the UK Labour Party ‘cyber-attack’, (13 November 2019).
BBC Radio 4, You & Yours: Cybersecurity expert answering questions from general public on specific issues and general guidance, (3 November 2015, 1215 – 1300). Full episode: Call You and Yours: Internet Safety.
Newspapers & Magazines
The Telegraph: Quote, “Who is listening to your Zoom call? Concerns grow over app’s security,” (27 March 2020).
New Scientist: Quote, “Google restricts Huawei’s use of Android,” (25 May 2019, p.7).
BBC News (Online):
- Quotes on British Airways and Magecart, “British Airways breach: How did hackers get in?,” (7 September 2018); “British Airways: Suspect code that hacked fliers ‘found’,” (11 September 2018).
- Quote on Facebook and malicious plugins, “Facebook sues over ‘data-grabbing’ quizzes,” (11 March 2019).
“Curative Anomalies: Computational Imaginaries of ‘Automated’ Security.” Re-Imagining Security: Between Science, Technology and Fiction. Online Workshop. 2 July 2020.
“Can the Computer Speak? Implications for More-than-Human Futures.” Social-Technological and Medical Imaginaries. Topologies of Security: Critical Security Studies in Postcolonial and Postsocialist Scenes. Dynamics of Security [Online]: Gießen, Germany. 29 June 2020.
“(Re)Cognizing War.” Global Politics in the Era of Disruptive Technologies: New Scenarios in an Old World? Standing Group di Relazioni Internazionali (SGRI) Conference, Società Italiana di Scienza Politica: Trento, Italy. 13 June 2019.
“(Re)Cognising Computation: New Political Actors in Security Studies.” Guest Lecture at SFB-TRR 138 ‘Dynamics of Security.’ Marburg, Germany. 28 May 2019.
“Anomalous Structures.” Finance, security, infrastructure – hegemonies in generative practices. Dynamics of Security, SFB-TRR 138; Gießen, Germany. 21 – 22 March 2019.
“Approaching Computation in Political Geography.” New Frontiers in Political Geography. University of Oxford; Oxford, UK. 25 September 2018.
“Negotiating maliciousness: The (Auto)Ethnographic “Becoming-Analyst.” S30W: Ethnographies of Technologies & the Security State. European International Studies Association Pan-European Conference (EISAPEC); Prague, Czech Republic. 15 September 2018.
“Automating the laboratory? Folding securities of malware.” New Geographies of Automation? (2): Spacings. RGS-IBG Annual Conference; Cardiff, UK. 29 August 2018.
“Rethinking Space in Cybersecurity.” Smart Cities. CDT in Cyber Security Student Conference; Royal Holloway, University of London, Egham, UK. 4 May 2018.
“The Malicious Transience: a malware ecology.” Machinic Encounters. Transient Topographies: Space and Interface in Literature and Art Conference; NUI Galway, Ireland. 21 April 2018.
“Maliciously corrupting spaces of the (non)object.” Geography’s Technology: Conceptualising technology, technics and the technological (2): Technicity. RGS-IBG Annual Conference; London, UK. 31 August 2017.
“Place-faking: fermenting resistance through digital productions of space” with J. Shaw. The Museum of Contemporary Commodities: creative propositions and provocations on the heritages of data-trade-place-value. RGS-IBG Annual Conference. London, UK. 1 September 2017.
“Situating Cyberspace(s): Ethnography as Depth.” Of Other Cybersecurities, Royal Holloway, University of London; Egham, UK. 15 June 2017.
“A More-than-Human Security: Performances of a Malware Politics.” Exploring the Modular, Material and Performative Politics of Security. Association of American Geographers Annual Meeting. Boston, USA. 8 April 2017.
“A Model for Future Security Cooperation: ICANN and the Conficker Working Group.” ICANN56. Helsinki, Finland. 26 July 2016.
“The kiss of death: an algorithmic curse.” Living with Algorithms Workshop. Royal Holloway, University of London. London, UK. 9 June 2016.
“W32.Stuxnet: An Olympic Games.” Moving Together – Exploring the nexus between disparate approaches to movement. Durham University. Durham, UK. 4 May 2016.
“The Pacemaker: Tracing cyber (re)territorialisations.” Future Fossils? Specimens from the 5th millennium “Return to Earth” expedition. RGS-IBG Annual Conference. Exeter, UK. 3 September 2015.