Author of the publication

Risking Security: Policies and Paradoxes of Cyberspace Security

, and . International Political Sociology, 4 (1): 15--32 (2010)
DOI: 10.1111/j.1749-5687.2009.00088.x

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Risking Security: Policies and Paradoxes of Cyberspace Security, and . International Political Sociology, 4 (1): 15--32 (2010)Privacy and Security Issues in BAT Web Browsers., , and . FOCI, USENIX Association, (2016)Targeted Threat Index: Characterizing and Quantifying Politically-Motivated Targeted Malware., , , , , , , and . USENIX Security Symposium, page 527-541. USENIX Association, (2014)Internet Filtering in China in 2004-2005: A Country Study, , , , , and . Berkman Center for Internet & Society at Harvard Law School Research, (April 2005)Control and Subversion in Russian Cyberspace., and . Access Controlled, MIT Press, (2010)A method for identifying and confirming the use of URL filtering products for censorship., , , , , , and . Internet Measurement Conference, page 23-30. ACM, (2013)Circuits of Power: Security in the Internet Environment. Information technologies and global politics: The changing scope of power and governance, State University of New York Press, Albany, (2002)Harold Innis and the Empire of Speed. Review of International Studies, (1999)Not by Technical Means Alone: The Multidisciplinary Challenge of Studying Information Controls., , and . IEEE Internet Comput., 17 (3): 34-41 (2013)Between Essentialism and Constructivism: Harold Innis and World Order Transformations. The Toronto School of Communication Theory: Interpretations, Extensions, Applications, University of Toronto Press, Toronto, (2007)