For the most up-to-date list, see my Google Scholar profile.
Books
- Beyer, J. (2014). Expect Us: Online Communities and Political Mobilization. Oxford University Press.
- Reviews:
- Candon, P. (2016). “Digital publics: Re-defining ‘the civic’ and re-locating ‘the political.’” New Media & Society 18(9): 2133-2138.
- Choi-Fitzpatrick, A. (2016) “Book Review,” Mobilization 21(1): 136-137. • Gerbaudo, P. (2016). Book Review: Expect Us: Online Communities and Political Mobilization. The International Journal of Press/Politics, 21(3), 418–420.
- Siwach, T. (2016). Book Review: Jessica L Beyer, Expect Us: Online Communities and Political Mobilization. Political Studies Review, 14(4), 599–599.
- Yang, G. (2016) “The Commercialization and Digitization of Social Movement Society,” Contemporary Sociology 45(2): 120-125.
- Gunitsky, S. (2015), “Book Review,” Perspectives on Politics 13(3): 878-879.
- McLemee, S. (2015) “From Lulz to Lawmaking,” Inside Higher Education.
- Reviews:
- Ingebritsen, C., Neumann, I., Gstöhl, S., and Beyer, J. (Eds.) (2006). Small States in International Relations. University of Washington Press/University of Iceland Press.
Refereed Journal Articles
- Hoque, M., Lee, K., Beyer, J., Curran, S., Gonser, K., Lam, N., Mihunov, V., and Wang, K. (2022). “Analyzing Tweeting Patterns and Public Engagement on Twitter During the Recognition Period of the COVID-19 Pandemic: A Study of Two U.S. States.” IEEE Access.
- Beyer , J. and McKelvey, F. (2015). “You Are Not Welcome Among Us: Pirates and the State,” International Journal of Communication.
- Beyer, J. (2014). “The Emergence of a Freedom of Information Movement? Anonymous, WikiLeaks, the Pirate Party, and Iceland,” Journal of Computer Mediated Communication, 19(2): 141-154.
- Earl, J. and Beyer, J. (2014). “The Dynamics of Backlash Online: Anonymous and the Battle for WikiLeaks,” Research in Social Movements, Conflicts and Change, volume 37.
- Beyer, J. and Hofmann, S. (2011). “Varieties of Neutrality: Norm Revision and Decline,” Cooperation and Conflict, 46(3): 285-311.
Book Chapters
- Beyer, J. (2021). “Trolls and Hacktivists: Political Mobilization from Online Communities.” Oxford Handbook of Sociology and Digital Media, Rohlinger, D. and Sobieraj, S., eds.
- Beyer, J. and Earl, J. (2018). “Backfire Online: Studying Reactions to the Repression of Internet Activism,” chapter in Paradox of Repression, Lester R. Kurtz and Lee A. Smiley (eds.).
- Beyer, J. (2013). “Anonymous and Authoritarian Regimes,” book chapter in State Power 2.0, Muzammil M. Hussain and Philip N. Howard (eds.).
- Beyer, J. (2011). “Women’s Engagement with Male-dominated Online Communities,” chapter in Cyberfeminism 2.0, edited by Radhika Gajjala and Yeon Ju Oh. New York: Peter Lang Publishing.
Book Reviews
- Beyer, J. L. (2023). “The Politics of Cybersecurity and the Global Internet.” Perspectives on Politics.
- Beyer, J. L. (2019). “Andrew Hoskins and John Tulloch, Risk and Hyperconnectivity: Media and Memories of Neoliberalism.” National Political Science Review.
- Beyer, J. L. (2018). “Geoffroy de Lagasnerie, The Art of Revolt: Snowden, Assange, and Manning.” Canadian Journal of Sociology, 43(4), 397-400.
- Beyer, J. L. (2015). “Eva Anduiza, Michael J. Jensen, and Laia Jorba, Digital Media and Political Engagement Worldwide: A Comparative Study; Catie Snow Bailard, Democracy’s Double-Edged Sword: How Internet Use Changes Citizens’ Views of Their Government.” Perspectives on Politics. Volume 13(3), 874-875.
Op-eds
- Phillips, W., Beyer, J., and Coleman, G. (2017). “Trolling Scholars Debunk the Idea That the Alt-Right’s Shitposters Have Magic Powers.” Motherboard. March 22.
- Park, D. and Beyer, J. (2017). “Commentary: Making Sense of North Korea’s Hacking Strategy.” Reuters. December 21.
- Beyer, J. (2016). “Commentary: Who is hacking U.S. election databases and why are they so difficult to identify?” Reuters. September 1.
White Papers
- Beyer, J., Quirk, C., Jacob, S., Lii, E., Osburn, L., Snider, M. (2023). Privacy and Internet of Things Devices in the Built Environment. Cybersecurity in the Built Environment Lab, University of Washington.
- Beyer, J., Osburn, L., Lii, E., Benson, C., Dossick, C. S., Snider, M. (2021). IoT Policy Landscape: Implications for Managing Security in the Built Environment. Cybersecurity in the Built Environment Lab, University of Washington.
- Osburn, L., Beyer, J., Dossick, C. S., & Benson, C. (2021). IoT and Cybersecurity Risk: Core Issues for the Building Industry. Cybersecurity in the Built Environment Lab, University of Washington.
- Ward, M. and Beyer, J. (2019) Vulnerable Landscapes: Case Studies of Violence and Disinformation. Wilson Center, Science & Technology Innovation Program.
- Ward, M., Pierson, S., and Beyer, J. (2019) Formative Battles: Cold War Disinformation Campaigns and Mitigation Strategies. Wilson Center, Science & Technology Innovation Program.
- Beyer, J., Birnbaum, D., and Zech, T. (2018). “The Next Step in Federal Cybersecurity? Considering an NTSB-Style Computer Safety Board.” Jackson School’s International Policy Institute. August 6.
- Lee, S. and Beyer, J. (2017). “Internet of Things Device Security and Supply Chain Management.” Wilson Center, Digital Futures Project. November 22.
- Beyer, J. and Curran, S. (2017). “Cybersecurity Workforce Preparedness: The Need for More Policy-Focused Education.” Wilson Center, Digital Futures Project. November 22.
- Kim, A., Lee, S., Marguleas, O., and Beyer, J. (2016). “Do Counter-Narrative Programs Slow Terrorist Recruiting?” Jackson School’s International Policy Institute. October 3.
- Karmali, N., Lee, S., Isberto, C., Oh, H., and Beyer, J. (2016). “JSIS Cybersecurity Report: How Should the Tech Industry Address Terrorist Use of Its Products?” Jackson School’s International Policy Institute. August 8.
Other Public Writing
- Beyer, J. (2022). “International Cybersecurity Norms and Dissent.” Mobilizing Ideas.
- Beyer, J. (2020). “Guccifer 2.0.” Hack_Curio.
- Beyer, J. (2019). “Hackers on Steroids.” Hack_Curio.
- Beyer, J. (2013). “Trying to make sense of the state response to ‘hackers.’” Culture Digitally. January 17.
- Beyer, J. (2012). “Drawing Lines: Trolling and Concept Formation.” Culture Digitally. August 10.
- Beyer, J. (2012). “Anonymous – because none of us are as cruel as all of us?” Culture Digitally. July 14.
Unpublished Research Reports Supervised/Co-written
- Global Patterns in Cybercrime & Ransomware Attacks, 2023.
- Mapping Cybersecurity Regulatory Systems: Unitary vs. Disparate Systems, 2022.
- Global Survey of Stand-alone Software Regulation, 2022.
- Evaluating Cybersecurity Policy, 2021.
- AI Policy and Risk, 2020.
- Landscape Analysis: Paris Call Stakeholder Community, 2019.
- International Election Security Best Practices, 2018.
- Threats to Democracy: Analysis of Major Actor Intent, 2018.
- Eight Country Case Studies of Election Security, 2018.
- The Next Data Tigers: Predicting Global Data Center Hotspots, 2018.
- Addressing Systemic Cybersecurity Risk, 2018.
- Cyberattack Attribution, 2017.
- Extremist Use of Information and Communication Technology, 2016.
- Sub-Saharan Region-wide Cybersecurity Profile, 2015.
- ASEAN’s Cybersecurity Profile, 2014.
- India and South Africa Domestic and International Governance Cybersecurity Profiles, 2013.