Enacting expertise: Ritual and risk in cybersecurity J Shires Politics and Governance 6 (2), 31-40, 2018 | 69 | 2018 |
Cyber-noir: Cybersecurity and popular culture J Shires Contemporary Security Policy 41 (1), 82-107, 2020 | 43 | 2020 |
The Simulation of Scandal: Hack-and-Leak Operations, the Gulf States, and US Politics (Fall 2020) J Shires Texas National Security Review, 2020 | 31 | 2020 |
The Politics of Cybersecurity in the Middle East J Shires Oxford University Press, 2022 | 29 | 2022 |
Hack-and-leak operations: intrusion and influence in the Gulf J Shires Journal of Cyber Policy 4 (2), 235-256, 2019 | 28 | 2019 |
The better angels of our digital nature? Offensive cyber capabilities and state violence FJ Egloff, J Shires European journal of international security 8 (1), 130-149, 2023 | 21 | 2023 |
Offensive cyber capabilities and state violence: Three logics of integration FJ Egloff, J Shires Journal of Global Security Studies 7 (1), ogab028, 2022 | 17 | 2022 |
Contesting ‘cyber’ J Shires, M Smeets New America Foundation, 2017 | 16* | 2017 |
Cybersecurity in the GCC: From economic development to geopolitical controversy B Hassib, J Shires Middle East Policy 29 (1), 90-103, 2022 | 14 | 2022 |
A primer on the proliferation of offensive cyber capabilities W DeSombre, M Campobasso, L Allodi, J Shires, JD Work, R Morgus, ... In-Depth Research & Reports: Issue Brief, 2021 | 14 | 2021 |
Countering cyber proliferation: Zeroing in on Access-as-a-Service W DeSombre, J Shires, JD Work, R Morgus, PH O’NEILL, L Allodi, T Herr Atlantic Council., 2022 | 13 | 2022 |
Cyber Operations during the 2022 Russian invasion of Ukraine: Lessons Learned (so far) M Kaminska, J Shires, MWE Smeets European Cyber Conflict Research Initiative Tallinn Workshop (ECCRI 2022), 2022 | 13 | 2022 |
Microtargeted propaganda by foreign actors: An interdisciplinary exploration R Ó Fathaigh, T Dobber, F Zuiderveen Borgesius, J Shires Maastricht Journal of European and Comparative Law 28 (6), 856-877, 2021 | 12 | 2021 |
Gender approaches to cybersecurity: design, defence and response K Millar, J Shires, T Tropina (No Title), 2021 | 12 | 2021 |
Manipulating uncertainty: cybersecurity politics in Egypt B Hassib, J Shires Journal of Cybersecurity 7 (1), tyaa026, 2021 | 11 | 2021 |
Family Resemblance or Family Argument? Three Perspectives on Cybersecurity and their Interactions J Shires St Antony's International Review 15 (1), 18-36, 2019 | 11 | 2019 |
Toward a decolonial cybersecurity: Interrogating the racial-epistemic hierarchies that constitute cybersecurity expertise D Mumford, J Shires Security Studies 32 (4-5), 622-652, 2023 | 9 | 2023 |
Is the GCC Cyber Resilient? J Shires, J Hakmeh London: Chatham House Royal Institute for International Affairs, 2020 | 8 | 2020 |
Cybersecurity governance in the GCC J Shires Rewired: Cybersecurity governance. Hoboken, NJ: Wiley-Blackwell, 2019 | 7 | 2019 |
The Cyber Dimensions of the Russia-Ukraine War T Grossman, M Kaminska, J Shires, M Smeets Workshop Report. UK NCSC and ECCRI, 2023 | 6 | 2023 |