Publications
Status: November 2025
Agrafiotis, I., Bada, M., Cornish, P., Creese, S. Goldsmith, M., Ignatuschtschenko, E., Roberts, T. and Upton, D. M. (2016). Cyber Harm: Concepts, Taxonomy and Measurement - Working Paper 2016-23. Available at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2828646
Agrafiotis, I., Beato, F., Creese, S., Dutton, Esteve-Gonzalez, P., Saunders, J., and Rohland, L. (2024). Unpacking Cyber Resilience. White Paper. World Economic Forum. Available at: https://www.weforum.org/publications/unpacking-cyber-resilience/
Agrafiotis, I., Nurse, J.R.C., Goldsmith, M., Creese, S., Upton, D. (2018). ‘A Taxonomy of Cyber-harms: Defining the Impacts of Cyber-attacks and Understanding How They Propagate’, Journal of Cybersecurity, v 4 n 1, p.1-15. Available at: https://academic.oup.com/cybersecurity/article/4/1/tyy006/5133288?searchresult=1
Austin, R. D. and Upton, D. M. (2016). Leading in the Age of Super-Transparency. MITSloan Management Review. 57(2), pp 25 – 32. Available at: http://research.cbs.dk/files/44436506/robert_austin_leading_in_the_age_postprint.pdf
Axon, L. Bouckaert, J., Creese, S., Joshi, A., and Saunders, J. (2025). Artificial Intelligence and Cybersecurity: Balancing Risks and Rewards. World Economic Forum. Available at: https://reports.weforum.org/docs/WEF_Artificial_Intelligence_and_Cybersecurity_Balancing_Risks_and_Rewards_2025.pdf
Axon, L., Creese, S., Dixon, W., and Saunders, J. (2020). Why we need to solve our quantum security challenges. World Economic Forum. Available at: https://www.weforum.org/agenda/2020/06/quantum-computers-security-challenges/
Axon, L., Saunders, J., Esteve-González, P., Carver, J., Dutton, W., Goldsmith, M., and Creese, S. (2025). Private-public initiatives for cybersecurity: the case of Ukraine. Journal of Cyber Policy, 9(3): 3991–4224. Available at: https://doi.org/10.1080/23738871.2025.2451256
Bada, M. and Sasse, A. (2014). Cyber Security Awareness Campaigns: Why do they fail to change behaviour? Available at: http://discovery.ucl.ac.uk/1468954/
Bada, M., Creese, S., Goldsmith, M. and Mitchell, C.J. (2017). Improving the Effectiveness of CSIRTs. CYBER 2017: The Second International Conference on Cyber-Technologies and Cyber-Systems. Available at: http://www.thinkmind.org/index.php?view=article&articleid=cyber_2017_4_30_80060
Bada, M., Creese, S., Goldsmith, M., Mitchell, C., & Phillips, E. (2017). Improving the effectiveness of CSIRTs. In The Second International Conference on Cyber-Technologies and Cyber-Systems (pp. 53-58). Available at: https://www.semanticscholar.org/paper/Improving-the-Effectiveness-of-CSIRTs-Bada-Creese/976697ab0217fedd540cac7bea08907762448970
Bada, M., Creese, S., Goldsmith, M., Mitchell, C.J., Phillips, E. (2014a). Computer Security Incident Response Teams (CSIRTs) – An Overview. Available at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3659974
Bada, M., Nurse, J.R.C. (2016). The Cybercrime Ecosystem: How the Internet Supports Criminal Behaviour Online. OII Oxford Internet Institute, Connected Life 2016: Collective Action and the Internet Conference, June 2016. Available at https://gcscc.ox.ac.uk/article/cybercrime-ecosystem-how-internet-may-support-criminal-behaviour-online
Bada, M., Nurse, J.R.C. (2016b). Profiling the Cybercriminal. International Crime and Intelligence Analysis Conference. 25-26 February 2016 Manchester, England. Available at https://gcscc.ox.ac.uk/article/profiling-cybercriminal
Bada, M., Von Solms, B., Agrafiotis, I. (2019). Reviewing National Cybersecurity Awareness for Users and Executives in Africa’, The International Journal on Advances in Security, v 12 n 1&2, p.108-118. Available at: http://www.iariajournals.org/security/sec_v12_n12_2019_paged.pdf
Bagui, L., Boorman, J., Calandro, E., Pule, N., Weisser Harris, C. (2020). Reviewing cybersecurity capacity in a COVID-19 environment. Available at: www.c3sa.uct.ac.za/c3sa/news/2020/review
Bauer, J. M. and Dutton, W. H. (2015). The New Cyber Security Agenda: Economic and Social Challenges to a Secure Internet, Joint working paper for the Oxford Global Cybersecurity Project at the Oxford Martin Institute, University of Oxford, and the Quello Center at MSU, based on a briefing document prepared by the authors to support the World Bank World Development Report. Available at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2614545
Bauer, J. M. and Dutton, W. H. (2021). Cybersecurity: Towards a New Agenda for Policy and Practice in Portuguese as: A Nova Agenda de Cbersegurança: Desafios Econômicos e Sociais Para Uma Internet Segura, pp. 35-64 in Cadernos NIC.br Estudos Setoriais - Segurança Digital: Uma Análise de Gestão de Risco em Empresa Brasileiras.
Bispham, M., Creese, S., Dutton, W. H., Esteve-González, P., and Goldsmith, M. (2022). An Exploratory Study of Cybersecurity in Working from Home: Problem or Enabler? Journal of Information Policy, 12: 353-386. Available at: https://doi.org/10.5325/jinfopoli.12.2022.0010
Blank, G., Boiko, N., Chernenko, E., Dembitsky, S., Dutton, W., and Goroshko, O. (2025). Political communication in wartime Ukraine. Paper presented at the 5th International Sociological Association Forum, 10 July in Rabat, Morocco.
Blank, G., Bolsover, G. and Dubois, E. (2014). A New Privacy Paradox: Young People and Privacy on Social Network Sites. Available at: https://www.oxfordmartin.ox.ac.uk/downloads/A%20New%20Privacy%20Paradox%20April%202014.pdf
Bund, J. (2019). Susceptibility Awareness: Domestic Vectors for Disrupting the Kill Chain of Cyber-enabled Influence Operations, European Cybersecurity Journal, v 5 n 2, p.34-45. Available at: https://cybersecforum.eu/media/ECJ_2019.pdf
Chernenko, Elizaveta and Dutton, W. H. (2025). The Role of Telegram in Wartime Ukraine: Trust, Utility, and Controversy, Portulans Institute, Washington DC, October 26. Available at: https://ssrn.com/abstract=5669030 or http://dx.doi.org/10.2139/ssrn.5669030
Cornish P. (2017). Deterrence and the Ethics of Cyber Conflict. In: Taddeo M., Glorioso L. eds. Ethics and Policies for Cyber Operations. Philosophical Studies Series. vol 124. Cham: Springer, pp. 1 – 16. Available at: https://link.springer.com/chapter/10.1007/978-3-319-45300-2_1
Creese, S., Dutton, W. H., and Esteve-González, P. (2021). The Social and Cultural Shaping of Cybersecurity Capacity Building: A Comparative Study of Nations and Regions. Personal and Ubiquitous Computing, 25, : 941-955. Available at: https://doi.org/10.1007/s00779-021-01569-6
Creese, S., Dutton, W. H., Esteve-González, P., and Shillair, R. (2021). Cybersecurity Capacity-Building: Cross-National Benefits and International Divides'. Journal of Cyber Policy, 6(2): 214-235. Available at: https://doi.org/10.1080/23738871.2021.1979617
Creese, S., Goldsmith, M., Griffin, M., Puello Alfonso S., Weisser Harris, C., Agrafiotis, I., Bund, J., and Nagyfejeo, E. (2019). GCSCC Global Impact. GCSCC Working Paper on the Knowledge and Policy Contributions from the First Five Years. Available at: https://gcscc.ox.ac.uk/sites/default/files/gcscc_booklet_web.pdf
Creese, A, Saunders, J., Axon L. and Dixon, W. (2020) Future Series Report: Cybersecurity, emerging technology and systemic risk, November 2020, Available at: https://www.weforum.org/reports/future-series-cybersecurity-emerging-technology-and-systemic-risk
Creese, S., Shillair, R., Bada, M., Reisdorf, B.C., and Dutton, W. H. (2019). The Cybersecurity Capacity of Nations, pp. 165-179 in Graham, M., and Dutton, W. H. (eds), Society and the Internet: How Networks of Information and Communication are Changing our Lives, 2nd Edition. Oxford: Oxford University Press.
De Bruin, R. and von Solms, S.H. (2015). Modelling Cyber Security Governance Maturity. 2015 IEEE International Symposium on Technology and Society, pp. 1–8. Available at: https://ieeexplore.ieee.org/abstract/document/7439415/
Dutton, W. H. (2017). Fostering a Cyber Security Mindset. Internet Policy Review, 6(1): DOI: 10.14763/2017.1.443. Available at: https://policyreview.info/node/443/pdf. An abridged version was reprinted in Encore, a publication of The Alexander von Humboldt Institute for Internet and Society (HIIG). 2018. Available at: https://www.hiig.de/en/fostering-cybersecurity-mindset/
Dutton, W. H. (2020) (ed.), A Research Agenda for Digital Politics. Cheltenham, UK and Northampton, MA, USA: Edward Elgar Publishing.
Dutton, W. H. (2020). The Fifth Estate: Canaries in the Institutions of Liberal Democracies, pp. 59-65 in Melanie Nagel, Patrick Kenis, Philip Leifeld, and Hans-Jörg Schmedes (Hrsg.), Politische Komplexität, Governance von Innovationen und Policy-Netzwerke: Festschrift für Volker Schneider. Wiesbaden, Germany: Springer VS. Available at: https://doi.org/10.1007/978-3-658-30914-5
Dutton, W. H. (2020). To Be or Not to Be Virtual. Intermedia Issue. Vol. 48 Issue 3. Available at: https://www.iicom.org/wp-content/uploads/dutton.pdf
Dutton, W. H. (2022). Will Going Online Save or Sink the Traditional University System?, Chapter 10, pp. 233-248 in Elizabeth Anne Kirley and Deborah Porter, eds, Outsmarting the Next Pandemic: What COVID-19 Can Teach Us. London and New York: Routledge.
Dutton, W. H. (2023). The Fifth Estate: The Power Shift of the Digital Age. New York: Oxford University Press.
Dutton, W. H. (2025). The War on Information in Ukraine: A Global Ecology, pp. 62-71 in Roland A. Römhildt , ed., Reclaiming Europe: A Collection of Essays. Berlin: Young Network TransEurope.
Dutton, W. H. and Axon, L. and Weisser Harris, C. (2021). Structured Field Coding and Its Application to National Assessments. Available at: https://ssrn.com/abstract=3781600
Dutton, W. H. and Blank, G. (2025). The War on Trust in Public Officials and the Media of Ukraine', Ukraine Studies Working Paper. Washington DC: Portulans Institute. Available at: https://ssrn.com/abstract=5202222 or http://dx.doi.org/10.2139/ssrn.5202222
Dutton, W. H. and Blank, G. (forthcoming). Liberal Democratic Crises over Digital Media have been Eclipsed by Russia’s War on Information, chapter in S, Coleman, F. Esser, J. Firmstone, K. Parry, and C. Paterson, eds., Public Communication in Free Fall, London: Palgrave.
Dutton, W. H. and Robertson, C. T. (2021). Disentangling Polarization and Civic Empowerment in the Digital Age: The Role of Filter Bubbles and Echo Chambers in the Rise of Populism, pp. 420-434 in Howard Tumber and Silvio Waisbord (eds), The Routledge Companion to Media Misinformation and Populism. New York: Routledge.
Dutton, W. H., and Dubois, E. (2023). The Fifth Estate: A New Source of Democratic Accountability, pp. 272-286 in Coleman, S., and Sorenson, L. (eds), Handbook of Digital Politics, Second Edition. Cheltenham, UK: Edward Elgar.
Dutton, W. H., and Zorina, A. (2021). The Ecology of Games Reshaping Information Policy: Internet Access in Belarus to Cyber Harms in the United Kingdom, Chapter 9, pp. 130-145, in Duff, A., ed., Research Handbook on Information Policy. Cheltenham, UK: Edward Elgar Publishing Ltd
Dutton, W. H., Creese, S., Sadie, Gonzalez, P. E, Goldsmith, Michael, G., and Weisser Harris , C. (2022). Next Steps for the EU: Building on the Paris Call and EU Cybersecurity Strategy. Available at: Available at: https://ssrn.com/abstract=4052728
Dutton, W. H., Creese, S., Shillair, R., and Bada, M. (2019a). Cyber Security Capacity: Does It Matter? Journal of Information Policy, 9, pp. 280-306. Available at https://scholarlypublishingcollective.org/psup/information-policy/article/doi/10.5325/jinfopoli.9.2019.0280/314505/Cybersecurity-Capacity-Does-It-Matter
Dutton, W. H., Goroshko, O., Dembitskyi, S., Chernenko, L., Blank, G., and Boiko, N. (2025). Trust in Media, Information, and the Government in Ukraine: A Virtuous Circle of Challenges, paper delivered at the 2025 Meeting of the World Internet Project, Berlin, Germany, 7 July. Available at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=5311707
Dutton, W. H., Griffin, M., Nagyfejeo, E., Puello Alfonso, S., Weisser Harris, C., and Bada, M., (2018). Collaborative Approaches to a Wicked Problem: Global Responses to Cybersecurity Capacity Building, February. GCSCC Working Paper on the 2018 Annual GCSCC Conference, Oxford University. Available at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3660000
Dutton, W. H., Shillair, R., Axon, L., and Weisser, C. (2023). Structured Field Coding and its Applications to National Risk and Cybersecurity Assessments, Applied Cybersecurity & Internet Governance, 2(1): 1-5. https://acigjournal.com/resources/html/article/details?id=614694&language=en
Dutton, W. H. and Esteve-Gonzalez, Patricia, Multidisciplinary Approaches to the Rise of Cybersecurity Research (November 17, 2020). Available at SSRN: https://ssrn.com/abstract=3732333 or http://dx.doi.org/10.2139/ssrn.3732333
Esteve-González, P., Axon, L., Creese, S., Dutton, W.H., Saunders, J., Carver, J., and Goldsmith, M. (2025). Cybersecurity Capacities for the Application of UN Cyber Norms. Available at SSRN. http://dx.doi.org/10.2139/ssrn.5089805
Esteve-González, P., Dutton, W. H., Creese, S., and Agrafiotis, I. (2023). Cybersecurity Implications of Changing Patterns of Office, Home, and Hybrid Work: An Exploratory Global Survey. Available at: http://dx.doi.org/10.2139/ssrn.4322366
Goroshko, O., Dutton, W. H., Dembitskyi, S., Chernenko, L., Boiko, N., and Blank, G. (2024). Media Use and Attitudes in Ukraine: A Smart Nation. Available at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4958986
Griffin, M. (2018). Global Cybersecurity Education – Lessons from the CMM. GCSCC Working Paper. Available at: https://gcscc.ox.ac.uk/article/global-cybersecurity-education-lessons-cmm
Hameed, F., Agrafiotis, I., Weisser, C., Goldsmith, M. and Creese S. (2018). Analysing Trends and Success Factors of International Cybersecurity Capacity-Building Initiatives. SECURWARE 2018: The Twelfth International Conference on Emerging Security Information, Systems and Technologies. Available at: https://ora.ox.ac.uk/objects/uuid:50e9c5aa-4f3d-40f0-a0a0-ff538b735291/download_file?file_format=pdf&safe_filename=Analysing-trends-success%2BFaisal%2BHameed%2B10SEP18%2BCamera%2BReady.pdf&type_of_work=Conference+item
Ignatuschtschenko, E. (2016). Jurisdiction on the Internet: Making Multi-Stakeholder Cooperation Work. Available at: https://gcscc.ox.ac.uk/article/jurisdiction-internet-making-multi-stakeholder-cooperation-work
Korff, Douwe. (2016). Harm caused to fundamental rights and freedoms by state cybersecurity interventions. Available at https://ssrn.com/abstract=3709808
Kritzinger, E., Bada, M., Nurse, J.R.C. (2017). A Study into the Cybersecurity Awareness Initiatives for School Learners in South Africa and the UK. In: Bishop, M., Futcher, L., Miloslavskaya, N., Theocharidou, M. eds. WISE 2017: Information Security Education for a Global Digital Society. Cham: Springer, pp. 110 – 120. Available at: https://link.springer.com/chapter/10.1007/978-3-319-58553-6_10
Nagyfejeo, E. (2018). EU’s Emerging Strategic Cyber Culture(s), Policing: A Journal of Policy and Practice, 24 December: 1-24. Available at https://doi.org/10.1093/police/pay092
Nagyfejeo, E., Solms, B.V. (2020). Why Do National Cybersecurity Awareness Programmes Often Fail?. International Journal of Information Security and Cybercrime, 9(2), 18-27. Available at: https://www.ijisc.com/year-2020-issue-2-article-3/
Nurse J. and Bada, M. (2019). The Group Element of Cybercrime: Types, Dynamics, and Criminal Operations. In: Attrill-Smith, A., Fullwood, C., Keep, M. and Kuss, D.J. eds. The Oxford Handbook of Cyberpsychology. Oxford: Oxford University Press. Available at: https://www.oxfordhandbooks.com/view/10.1093/oxfordhb/9780198812746.001.0001/oxfordhb-9780198812746-e-36?print=pdf
Nurse, J. R. C. and Bada, M. (2017). Connected Life: Digital Inequalities. MIND THE GAP: How Digital Inequality Impacts Cyber Security. Oxford: Oxford Internet Institute.
Nurse, J., Agrafiotis, I., Erola, A., Bada, M., Roberts, T., Williams, M., Goldsmith, M., and Creese, S. (2016). An Independent Assessment of the Procedural Components of the Estonian Internet Voting System - Working Paper 6. Cyber Studies Programme Working Paper Series in Department of Politics and International Relations, University of Oxford. Available at: https://ssrn.com/abstract=2858336
Reisdorf, B., Fernandez, L., Hampton, K. N., Shin, I., and Dutton, W. H. (2020). Mobile Phones Will Not Eliminate Digital and Social Divides: How Variation in Internet Activities Mediates the Relationship between Type of Internet Access and Local Social Capital in Detroit, Social Science Computer Review, March: https://doi.org/10.1177/0894439320909446
Roberts, T. (2016) Deciphering the Chinese Underground Economy. GCSCC Working Paper. Available at: https://gcscc.ox.ac.uk/article/deciphering-chinese-underground-economy
Roberts, T., Bada, M., and Dotzauer, E. (2014). Strategies for Increasing Scale and Quality of Cybersecurity Capacity-Building Investments. Available at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3660003
Rohland, L., Beato, F., Paine, K., Agrafiotis, I., Creese, S., Dutton, W.H., Esteve-Gonzalez, P., and Saunders, J. (2025). The Cyber Resilience Compass: Journeys Towards Resilience. World Economic Forum. Available at: https://www.weforum.org/publications/the-cyber-resilience-compass-journeys-towards-resilience/
Rudolph, C., Creese, S., Sharma, S. (2020). Cybersecurity in Pacific Island Nations. Communications of the ACM. Vol. 63 No. 4, Pages 53-54. Available at: https://doi.org/10.1145/3378550
Sheriff, P., Weisser Harris, C. and Saunders, J., (2024). Evaluating the Impact of Cybersecurity Capacity Building. Available at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4821426
Shillair, R., Esteve-Gonzaez, P., Dutton., W., Creese, S., and von Solms, B. (2023). Building Cybersecurity Capacity Through Education, Awareness, and Training, pp. forthcoming Chapter 22 in Vajjhala, N.R. & Strang, K.D. (eds), Cybersecurity for Decision Makers. London: Taylor & Francis. Available at: https://doi.org/10.1201/9781003319887
Shillair, R., Esteve-González, P., Dutton, W. H., Creese, S., Nagyfejeo, E., and Von Solms, B. (2022)., Cybersecurity Education, Awareness Raising, and Training Initiatives: National Level Evidence-Based Results, Challenges, and Promise.’, Computers & Security, 119. (May). Available at: https://doi.org/10.1016/j.cose.2022.102756
Von Solms, B. and Upton, D. (2016). Cyber security capacity governance. The Business & Management Review. 7(4), pp. 34.
Wall, D.S. (2024) Cybercrime: The transformation of crime in the information age, 2nd Edition (Significant rewrite), Cambridge: Polity. (Hardback ISBN: 978-0-745-65352-5) (Paperback ISBN: 978-0-745-65353-2) / UK Publication date 26 April 2024, US Publication date 22 July 2024.
Weisser Harris, C. and Bada, M. (2016). Kosovo – What Followed the CMM Review? A GCSCC Working Paper. Available at: https://gcscc.ox.ac.uk/article/kosovo-what-followed-cmm-review
Yates, S. J., Jones, G., Preston, A., Dutton, B., and Carmi, E. (2020). ESRC Review: Governance and Security, pp. 605-627 in Rice, R. E., Yates, S. J. (eds), The Oxford Handbook of Digital Technology and Society. New York, NY: Oxford University Press.
Zhang, X., Wan-Ying Lin, W-Y. and Dutton, W. H. (2022). The Political Consequences of Online Disagreement: The Filtering of Communication Networks in a Polarized Political Context, Social Media and Society, 8(3). Available at: https://doi.org/10.1177/20563051221114391
Zorina, A., and Dutton, W. H. (2021). Theorizing Actor Interactions Shaping Innovation in Digital Infrastructures: The Case of Residential Internet Development in Belarus’, Organization Science, 32(1), 156-180. Also published online in Articles in Advance: 26 Oct 2020, Available at: https://doi.org/10.1287/orsc.2020.1389