You can find selected publications below. The titles link to a copy where it is available, but if you would like to read something that you can't find here, please let me know.

 

PEER-REVIEWED JOURNAL ARTICLES

"The simulation of scandal: hack-and-leak operations, the Gulf states, and U.S. politics". Texas National Security Review 3 (4), Fall 2020. Part of a special issue on "Cyber competition", edited by Robert Chesney and Max Smeets.

"Cyber-noir: cybersecurity and popular culture". Contemporary Security Policy 41 (1) 2020, pp.82-107 (online 2019). Part of a special issue on "Cyber security politics", edited by Myriam Dunn Cavelty and Andreas Wenger.

"Hack-and-leak operations: intrusion and influence in the Gulf". Journal of Cyber Policy 4 (2) 2019, pp.235-256.

"Family resemblance or family argument? Three perspectives on cybersecurity and their interaction". St Anthony's International Review 15 (1), 2019, pp.18-36.

“Enacting expertise: ritual and risk in cybersecurity”, Politics and Governance 6 (2), 2018, pp.31-40. Part of a special issue on “Global Cybersecurity: New Directions in Theory and Methods”, edited by Tim Stevens.

ACADEMIC BOOK CHAPTERS

 

"Disinformation in the Gulf", in M. Sexton and E. Campbell (ed.) Cyber War & Cyber Peace in the Middle East: Digital Conflict in the Cradle of Civilization. Middle East Institute, 2020.

"Ambiguity and appropriation: cybersecurity and cybercrime in Egypt and the Gulf", in D. Broeders and B. van den Berg (ed.) Governing Cyberspace: Behavior, Power and Diplomacy. Rowman & Littlefield, 2020.

“Cybersecurity governance in the GCC”, in R. Ellis and V. Mohan (ed.) Rewired: Cybersecurity Governance. Wiley-Blackwell, 2019.

OTHER PUBLICATIONS

"Understanding the tactics behind hack-and-leak operations".​​ Atlantisch Perspectief no.4, September 2020.

"Hack-and-leak operations and U.S. cyber policy". War on the Rocks, August 2020.

 

"Big cyber ideas: cyber policy, creativity and inspiration". Leiden Security and Global Affairs blog, 8 June 2020.

"Is the GCC cyber resilient?" Chatham House Briefing Paper, 9 March 2020 (with Joyce Hakmeh).

"Iran sharpens cyber tools for foreign policy ends". Oxford Analytica, 21 March 2019.

"Between multistakeholderism and sovereignty: cyber norms in Egypt and the Gulf states". War on the Rocks, Oct. 2018

"Iran may prioritise cyber espionage, not attack". Oxford Analytica, 11 July 2018.

 

"Cybersecurity expertise in the Gulf states". LSE Middle East Centre Blog, 29 May 2018.

“Lessons in cyberpower from the GCC split”. Oxford Analytica, 6 February 2018.

 

“Contesting ‘Cyber’”. New America Foundation, Washington D.C. December 2017 (with Max Smeets).

“The word 'cyber' now means everything - and nothing at all”. Slate, 01 December 2017 (with Max Smeets).

 

“Discourses of cybersecurity: regional cyber risks in the Middle East”. International Institute for Strategic Studies, London, March 2016.

 

“Negotiating order in cyberspace: security spirals or trade foundations?” German Marshall Fund, Brussels, February 2016 (with Catherine Laporte-Oshiro).

© 2020 James Shires.

  • LinkedIn Social Icon
  • Twitter Social Icon