Skip to main content

For the most up-to-date list, see my Google Scholar profile.


  • Beyer, J. (2014). Expect Us: Online Communities and Political Mobilization. Oxford University Press.
    • Reviews:
      • Candon, P. (2016). “Digital publics: Re-defining ‘the civic’ and re-locating ‘the political.’” New Media & Society 18(9): 2133-2138.
      • Choi-Fitzpatrick, A. (2016) “Book Review,” Mobilization 21(1): 136-137. • Gerbaudo, P. (2016). Book Review: Expect Us: Online Communities and Political Mobilization. The International Journal of Press/Politics, 21(3), 418–420.
      • Siwach, T. (2016). Book Review: Jessica L Beyer, Expect Us: Online Communities and Political Mobilization. Political Studies Review, 14(4), 599–599.
      • Yang, G. (2016) “The Commercialization and Digitization of Social Movement Society,” Contemporary Sociology 45(2): 120-125.
      • Gunitsky, S. (2015), “Book Review,” Perspectives on Politics 13(3): 878-879.
      • McLemee, S. (2015) “From Lulz to Lawmaking,” Inside Higher Education.
Ingebritsen, C., Neumann, I., Gstöhl, S., and Beyer, J. (Eds.) (2006). Small States in International Relations. University of Washington Press/University of Iceland Press.

Refereed Journal Articles

  • Hoque, M., Lee, K., Beyer, J., Curran, S., Gonser, K., Lam, N., Mihunov, V., and Wang, K. (2022). “Analyzing Tweeting Patterns and Public Engagement on Twitter During the Recognition Period of the COVID-19 Pandemic: A Study of Two U.S. States.” IEEE Access.
  • Beyer , J. and McKelvey, F. (2015). “You Are Not Welcome Among Us: Pirates and the State,” International Journal of Communication.
  • Beyer, J. (2014). “The Emergence of a Freedom of Information Movement? Anonymous, WikiLeaks, the Pirate Party, and Iceland,” Journal of Computer Mediated Communication, 19(2): 141-154.
  • Earl, J. and Beyer, J. (2014). “The Dynamics of Backlash Online: Anonymous and the Battle for WikiLeaks,” Research in Social Movements, Conflicts and Change, volume 37.
  • Beyer, J. and Hofmann, S. (2011). “Varieties of Neutrality: Norm Revision and Decline,” Cooperation and Conflict, 46(3): 285-311.

Book Chapters

  • Beyer, J. (2021). “Trolls and Hacktivists: Political Mobilization from Online Communities.” Oxford Handbook of Sociology and Digital Media, Rohlinger, D. and Sobieraj, S., eds.
  • Beyer, J. and Earl, J. (2018). “Backfire Online: Studying Reactions to the Repression of Internet Activism,” chapter in Paradox of Repression, Lester R. Kurtz and Lee A. Smiley (eds.).
  • Beyer, J. (2013). “Anonymous and Authoritarian Regimes,” book chapter in State Power 2.0, Muzammil M. Hussain and Philip N. Howard (eds.).
  • Beyer, J. (2011). “Women’s Engagement with Male-dominated Online Communities,” chapter in Cyberfeminism 2.0, edited by Radhika Gajjala and Yeon Ju Oh. New York: Peter Lang Publishing.

Book Reviews

  • Beyer, J. L. (2023). “The Politics of Cybersecurity and the Global Internet.” Perspectives on Politics.
  • Beyer, J. L. (2019). “Andrew Hoskins and John Tulloch, Risk and Hyperconnectivity: Media and Memories of Neoliberalism.” National Political Science Review.
  • Beyer, J. L. (2018). “Geoffroy de Lagasnerie, The Art of Revolt: Snowden, Assange, and Manning.” Canadian Journal of Sociology, 43(4), 397-400.
  • Beyer, J. L. (2015). “Eva Anduiza, Michael J. Jensen, and Laia Jorba, Digital Media and Political Engagement Worldwide: A Comparative Study; Catie Snow Bailard, Democracy’s Double-Edged Sword: How Internet Use Changes Citizens’ Views of Their Government.” Perspectives on Politics. Volume 13(3), 874-875.


White Papers

Other Public Writing

Unpublished Research Reports Supervised/Co-written

  • Global Patterns in Cybercrime & Ransomware Attacks, 2023.
  • Mapping Cybersecurity Regulatory Systems: Unitary vs. Disparate Systems, 2022.
  • Global Survey of Stand-alone Software Regulation, 2022.
  • Evaluating Cybersecurity Policy, 2021.
  • AI Policy and Risk, 2020.
  • Landscape Analysis: Paris Call Stakeholder Community, 2019.
  • International Election Security Best Practices, 2018.
  • Threats to Democracy: Analysis of Major Actor Intent, 2018.
  • Eight Country Case Studies of Election Security, 2018.
  • The Next Data Tigers: Predicting Global Data Center Hotspots, 2018.
  • Addressing Systemic Cybersecurity Risk, 2018.
  • Cyberattack Attribution, 2017.
  • Extremist Use of Information and Communication Technology, 2016.
  • Sub-Saharan Region-wide Cybersecurity Profile, 2015.
  • ASEAN’s Cybersecurity Profile, 2014.
  • India and South Africa Domestic and International Governance Cybersecurity Profiles, 2013.