Publications

 Full publications list in alphabetical order. 

 

2025

Axon, L., Bouckaert, J., Creese, S., Joshi, A., & Saunders, J. (2025). Artificial intelligence and cybersecurity: Balancing risks and rewards. World Economic Forum. https://reports.weforum.org/docs/WEF_Artificial_Intelligence_and_Cybersecurity_Balancing_Risks_and_Rewards_2025.pdf

Blank, G., Boiko, N., Chernenko, E., Dembitsky, S., Dutton, W. H., & Goroshko, O. (2025). Political communication in wartime Ukraine. Conference presentation.

Chernenko, E., & Dutton, W. H. (2025). The role of Telegram in wartime Ukraine. https://doi.org/10.2139/ssrn.5669030

Dutton, W. H. (2025). The war on information in Ukraine. In Reclaiming Europe (pp. 62–71).

Dutton, W. H., & Blank, G. (2025). The war on trust in public officials and the media of Ukraine. https://ssrn.com/abstract=5202222

Dutton, W. H., Goroshko, O., Dembitskyi, S., Chernenko, L., Blank, G., & Boiko, N. (2025). Trust in media, information, and the government in Ukraine: A virtuous circle of challenges [Conference presentation]. 2025 Meeting of the World Internet Project, Berlin, Germany. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=5311707

Esteve-González, P., Axon, L., Creese, S., Dutton, W. H., Saunders, J., Carver, J., & Goldsmith, M. (2025). Cybersecurity capacities for the application of UN cyber norms. https://doi.org/10.2139/ssrn.5089805

Rohland, L., Beato, F., Paine, K., Agrafiotis, I., Creese, S., Dutton, W. H., Esteve-González, P., & Saunders, J. (2025). The cyber resilience compass. World Economic Forum. https://reports.weforum.org/docs/WEF_The_Cyber_Resilience_Compass_2025.pdf

 

2024

Agrafiotis, I., Beato, F., Creese, S., Dutton, W. H., Esteve-González, P., Saunders, J., & Rohland, L. (2024). Unpacking cyber resilience. World Economic Forum. https://www.weforum.org/publications/unpacking-cyber-resilience/

Axon, L., Saunders, J., Esteve-González, P., Carver, J., Dutton, W., Goldsmith, M., & Creese, S. (2024). Private-public initiatives for cybersecurity: The case of Ukraine. Journal of Cyber Policy, 9(3), 399–422.

Goroshko, O., Dutton, W. H., Dembitskyi, S., Chernenko, L., Boiko, N., & Blank, G. (2024). Media use and attitudes in Ukraine: A smart nation. https://papers.ssrn.com/abstract=4958986

Sheriff, P., Weisser Harris, C., & Saunders, J. (2024). Evaluating the impact of cybersecurity capacity building. https://papers.ssrn.com/abstract=4821426

Wall, D. S. (2024). Cybercrime: The transformation of crime in the information age (2nd ed.). Polity.

 

2023

Dutton, W. H. (2023). The Fifth Estate: The power shift of the digital age. Oxford University Press.

Dutton, W. H., & Dubois, E. (2023). The Fifth Estate: A new source of democratic accountability. In S. Coleman & L. Sorenson (Eds.), Handbook of digital politics (2nd ed., pp. 272–286). Edward Elgar.

Dutton, W. H., Shillair, R., Axon, L., & Weisser, C. (2023). Structured field coding and its applications to national risk and cybersecurity assessments. Applied Cybersecurity & Internet Governance, 2(1), 1–5. https://acigjournal.com/resources/html/article/details?id=614694&language=en

Shillair, R., Esteve-González, P., Dutton, W. H., Creese, S., & von Solms, B. (2023). Building cybersecurity capacity through education, awareness, and training. In N. R. Vajjhala & K. D. Strang (Eds.), Cybersecurity for decision makers (Chapter 22, forthcoming). Taylor & Francis. https://doi.org/10.1201/9781003319887

 

2022

Bispham, M., Creese, S., Dutton, W. H., Esteve-González, P., & Goldsmith, M. (2022). Cybersecurity in working from home. Journal of Information Policy, 12, 353–386.

Dutton, W. H. (2022). Will going online save or sink the traditional university system? In Outsmarting the Next Pandemic (pp. 233–248). Routledge.

Shillair, R., Esteve-González, P., Dutton, W. H., Creese, S., Nagyfejeo, E., & von Solms, B. (2022). Cybersecurity education, awareness raising, and training initiatives: National level evidence-based results, challenges, and promise. Computers & Security, 119. https://doi.org/10.1016/j.cose.2022.102756

Zhang, X., Wan-Ying Lin, W.-Y., & Dutton, W. H. (2022). Political consequences of online disagreement. Social Media + Society, 8(3). https://doi.org/10.1177/20563051221114391

 

2021

Bauer, J. M., & Dutton, W. H. (2021). Cybersecurity: Towards a new agenda for policy and practice. In Cadernos NIC.br Estudos Setoriais (pp. 35–64).

Creese, S., Dutton, W. H., & Esteve-González, P. (2021). The social and cultural shaping of cybersecurity capacity building: A comparative study of nations and regions. Personal and Ubiquitous Computing, 25, 941–955. https://doi.org/10.1007/s00779-021-01569-6

Creese, S., Dutton, W. H., Esteve-González, P., & Shillair, R. (2021). Cybersecurity capacity-building: Cross-national benefits and international divides. Journal of Cyber Policy, 6(2), 214–235. https://doi.org/10.1080/23738871.2021.1979617

Dutton, W. H., Axon, L., & Weisser Harris, C. (2021). Structured field coding and its application to national assessments (Working paper). https://ssrn.com/abstract=3781600

Dutton, W. H., & Robertson, C. T. (2021). Disentangling polarization and civic empowerment in the digital age: The role of filter bubbles and echo chambers in the rise of populism. In H. Tumber & S. Waisbord (Eds.), The Routledge companion to media misinformation and populism (pp. 420–434). Routledge.

Dutton, W. H., & Zorina, A. (2021). The ecology of games reshaping information policy: Internet access in Belarus to cyber harms in the United Kingdom. In A. Duff (Ed.), Research handbook on information policy (pp. 130–145). Edward Elgar.

Zorina, A., & Dutton, W. H. (2021). Theorizing actor interactions shaping innovation in digital infrastructures: The case of residential Internet development in Belarus. Organization Science, 32(1), 156–180. https://doi.org/10.1287/orsc.2020.1389

 

2020

Axon, L., Creese, S., Dixon, W., & Saunders, J. (2020). Why we need to solve our quantum security challenges. World Economic Forum. https://www.weforum.org/agenda/2020/06/quantum-computers-security-challenges/

Bagui, L., Boorman, J., Calandro, E., Pule, N., & Weisser Harris, C. (2020). Reviewing cybersecurity capacity in a COVID-19 environment. https://www.c3sa.uct.ac.za/c3sa/news/2020/review

Creese, A., Saunders, J., Axon, L., & Dixon, W. (2020). Future Series Report: Cybersecurity, emerging technology and systemic risk. World Economic Forum.

Dutton, W. H. (2020). To be or not to be virtual. Intermedia, 48(3). https://www.iicom.org/wp-content/uploads/dutton.pdf

Dutton, W. H. (Ed.). (2020). A research agenda for digital politics. Edward Elgar Publishing.

Dutton, W. H., & Esteve-González, P. (2020). Multidisciplinary approaches to the rise of cybersecurity research. https://ssrn.com/abstract=3732333

Reisdorf, B., Fernandez, L., Hampton, K. N., Shin, I., & Dutton, W. H. (2020). Mobile phones will not eliminate digital and social divides. Social Science Computer Review. https://doi.org/10.1177/0894439320909446

Rudolph, C., Creese, S., & Sharma, S. (2020). Cybersecurity in Pacific Island nations. Communications of the ACM, 63(4), 53–54. https://doi.org/10.1145/3378550

Yates, S. J., Jones, G., Preston, A., Dutton, B., & Carmi, E. (2020). ESRC review: Governance and security. In The Oxford Handbook of Digital Technology and Society (pp. 605–627). Oxford University Press.

 

2019

Bada, M., von Solms, B., & Agrafiotis, I. (2019). Reviewing national cybersecurity awareness for users and executives in Africa. The International Journal on Advances in Security, 12(1-2), 108–118. http://www.iariajournals.org/security/sec_v12_n12_2019_paged.pdf

Bund, J. (2019). Susceptibility awareness. European Cybersecurity Journal, 5(2), 34–45. https://cybersecforum.eu/media/ECJ_2019.pdf

Creese, S., Goldsmith, M., Griffin, M., Puello Alfonso, S., Weisser Harris, C., Agrafiotis, I., Bund, J., & Nagyfejeo, E. (2019). GCSCC global impact. https://gcscc.ox.ac.uk/sites/default/files/gcscc_booklet_web.pdf

Creese, S., Shillair, R., Bada, M., Reisdorf, B. C., & Dutton, W. H. (2019). The cybersecurity capacity of nations. In Society and the Internet (pp. 165–179). Oxford University Press.

Dutton, W. H., Creese, S., Shillair, R., & Bada, M. (2019). Cyber security capacity: Does it matter? Journal of Information Policy, 9, 280–306. https://doi.org/10.5325/jinfopoli.9.2019.0280

 

2018

Agrafiotis, I., Nurse, J. R. C., Goldsmith, M., Creese, S., & Upton, D. (2018). A taxonomy of cyber-harms. Journal of Cybersecurity, 4(1), 1–15. https://academic.oup.com/cybersecurity/article/4/1/tyy006/5133288

Dutton, W. H., Griffin, M., Nagyfejeo, E., Puello Alfonso, S., Weisser Harris, C., & Bada, M. (2018). Collaborative approaches to a wicked problem (GCSCC Working Paper). https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3660000

Griffin, M. (2018). Global cybersecurity education – Lessons from the CMM. https://gcscc.ox.ac.uk/article/global-cybersecurity-education-lessons-cmm

Nagyfejeo, E. (2018). EU’s emerging strategic cyber culture(s). Policing: A Journal of Policy and Practice. https://doi.org/10.1093/police/pay092

 

2017

Bada, M., Creese, S., Goldsmith, M., Mitchell, C., & Phillips, E. (2017). Improving the effectiveness of CSIRTs. In The Second International Conference on Cyber-Technologies and Cyber-Systems (pp. 53–58). https://www.semanticscholar.org/paper/Improving-the-Effectiveness-of-CSIRTs-Bada-Creese/976697ab0217fedd540cac7bea08907762448970

Cornish, P. (2017). Deterrence and the ethics of cyber conflict. In M. Taddeo & L. Glorioso (Eds.), Ethics and policies for cyber operations (pp. 1–16). Springer. https://link.springer.com/chapter/10.1007/978-3-319-45300-2_1

Kritzinger, E., Bada, M., & Nurse, J. R. C. (2017). A study into the cybersecurity awareness initiatives for school learners in South Africa and the UK. In WISE 2017 (pp. 110–120). Springer. https://link.springer.com/chapter/10.1007/978-3-319-58553-6_10

 

2016

Agrafiotis, I., Bada, M., Cornish, P., Creese, S., Goldsmith, M., Ignatuschtschenko, E., Roberts, T., & Upton, D. M. (2016). Cyber harm: Concepts, taxonomy and measurement (Working Paper No. 2016-23). https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2828646

Austin, R. D., & Upton, D. M. (2016). Leading in the age of super-transparency. MIT Sloan Management Review, 57(2), 25–32. http://research.cbs.dk/files/44436506/robert_austin_leading_in_the_age_postprint.pdf

Bada, M., & Nurse, J. R. C. (2016). The cybercrime ecosystem: How the Internet supports criminal behaviour online. Connected Life 2016 Conference. https://gcscc.ox.ac.uk/article/cybercrime-ecosystem-how-internet-may-support-criminal-behaviour-online

Bada, M., & Nurse, J. R. C. (2016b). Profiling the cybercriminal. International Crime and Intelligence Analysis Conference. https://gcscc.ox.ac.uk/article/profiling-cybercriminal

Ignatuschtschenko, E. (2016). Jurisdiction on the Internet: Making multi-stakeholder cooperation work. https://gcscc.ox.ac.uk/article/jurisdiction-internet-making-multi-stakeholder-cooperation-work

Korff, D. (2016). Harm caused to fundamental rights and freedoms by state cybersecurity interventions. https://ssrn.com/abstract=3709808

Von Solms, B., & Upton, D. (2016). Cyber security capacity governance. The Business & Management Review, 7(4), 34.

Weisser Harris, C., & Bada, M. (2016). Kosovo – What followed the CMM review? GCSCC Working Paper. https://gcscc.ox.ac.uk/article/kosovo-what-followed-cmm-review

 

2015

Bauer, J. M., & Dutton, W. H. (2015). The new cyber security agenda: Economic and social challenges to a secure Internet (Working paper). https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2614545

De Bruin, R., & von Solms, S. H. (2015). Modelling cyber security governance maturity. In 2015 IEEE International Symposium on Technology and Society (pp. 1–8). https://ieeexplore.ieee.org/abstract/document/7439415/

 

2014

Bada, M., & Sasse, A. (2014). Cyber security awareness campaigns: Why do they fail to change behaviour? http://discovery.ucl.ac.uk/1468954/

Bada, M., Creese, S., Goldsmith, M., Mitchell, C., & Phillips, E. (2014). Computer security incident response teams (CSIRTs): An overview. The Global Cyber Security Capacity Centre. https://ssrn.com/abstract=3659974

Blank, G., Bolsover, G., & Dubois, E. (2014). A new privacy paradox: Young people and privacy on social network sites. https://www.oxfordmartin.ox.ac.uk/downloads/A%20New%20Privacy%20Paradox%20April%202014.pdf

Roberts, T., Bada, M., & Dotzauer, E. (2014). Strategies for increasing scale and quality of cybersecurity capacity-building investments. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3660003