Ronald Deibert
#24,010
Most Influential Person Now
Canadian academic
Ronald Deibert's AcademicInfluence.com Rankings
Ronald Deibertpolitical-science Degrees
Political Science
#720
World Rank
#916
Historical Rank
Human Rights
#49
World Rank
#60
Historical Rank
Ronald Deibertcomputer-science Degrees
Computer Science
#2558
World Rank
#2671
Historical Rank
Database
#8890
World Rank
#9344
Historical Rank
Download Badge
Political Science Computer Science
Ronald Deibert's Degrees
- PhD Political Science University of British Columbia
- Masters Political Science University of British Columbia
- Bachelors Political Science University of Calgary
Why Is Ronald Deibert Influential?
(Suggest an Edit or Addition)According to Wikipedia, Ronald James Deibert is a Canadian professor of political science, philosopher, founder and director of the Citizen Lab at the Munk School of Global Affairs, University of Toronto. He is a co-founder and a principal investigator of the OpenNet Initiative and Information Warfare Monitor projects. Deibert was one of the founders and former VP of global policy and outreach for Psiphon.
Ronald Deibert's Published Works
Published Works
- Access Controlled - The Shaping of Power, Rights, and Rule in Cyberspace (2010) (322)
- Parchment, printing, and hypermedia : communication in world order transformation (1997) (210)
- Access Denied: The Practice and Policy of Global Internet Filtering - Book Review (2009) (165)
- Liberation vs. Control: The Future of Cyberspace (2010) (149)
- International Plug 'n Play? Citizen Activism, the Internet, and Global Public Policy (2000) (148)
- Risking Security: Policies and Paradoxes of Cyberspace Security (2010) (138)
- The Governance of Digital Technology, Big Data, and the Internet: New Roles and Responsibilities for Business (2019) (119)
- Global Governance and the Spread of Cyberspace Controls (2012) (93)
- The Road to Digital Unfreedom: Three Painful Truths About Social Media (2019) (78)
- Internet Filtering in China in 2004-2005: A Country Study (2005) (77)
- Cyclones in cyberspace: Information shaping and denial in the 2008 Russia–Georgia war (2012) (74)
- Black Code: Censorship, Surveillance, and the Militarisation of Cyberspace (2003) (74)
- Internet Filtering: The Politics and Mechanisms of Control (2008) (71)
- Access Contested (2011) (70)
- Dark Guests and Great Firewalls: The Internet and Chinese Security Policy (2002) (66)
- The geopolitics of internet control: censorship, sovereignty, and cyberspace (2008) (61)
- An Analysis of China's "Great Cannon" (2015) (58)
- Authoritarianism Goes Global: Cyberspace Under Siege (2015) (52)
- `Exorcismus Theoriae': (1997) (49)
- Targeted Threat Index: Characterizing and Quantifying Politically-Motivated Targeted Malware (2014) (48)
- Control and Subversion in Russian Cyberspace (2010) (46)
- A method for identifying and confirming the use of URL filtering products for censorship (2013) (44)
- The Geopolitics of Cyberspace After Snowden (2015) (41)
- Beyond Denial: Introducing Next-Generation Information Access Controls (2010) (36)
- Access Denied The Practice and Policy of Global Internet Filtering (2008) (35)
- Harold Innis and the Empire of Speed (1999) (31)
- A tale of two cybers - how threat reporting by cybersecurity firms systematically underrepresents threats to civil society (2020) (31)
- The Growing Dark Side of Cyberspace ( . . . and What To Do About It) (2012) (30)
- Measuring Global Internet Filtering (2008) (30)
- Tools and Technology of Internet Filtering (2008) (27)
- Good for Liberty, Bad for Security? Global Civil Society and the Securitization of the Internet (2008) (23)
- Distributed Security as Cyber Strategy: Outlining a Comprehensive Approach for Canada in Cyberspace (2012) (22)
- Not by Technical Means Alone: The Multidisciplinary Challenge of Studying Information Controls (2013) (22)
- Toward a Human-Centric Approach to Cybersecurity (2018) (21)
- Hacking Networks of Terror (2002) (20)
- Ronald Deibert: Tracking the emerging arms race in cyberspace (2011) (20)
- The Global Political Economy of Communications (1994) (19)
- Planet Blue Coat: Mapping Global Censorship and Surveillance Tools (2013) (17)
- The Predator in Your Pocket: A Multidisciplinary Assessment of the Stalkerware Application Industry (2019) (16)
- The geopolitics of internet control (2008) (14)
- Online Surveillance, Censorship, and Encryption in Academia (2019) (13)
- Internet Filtering in China 2004-2005 (2005) (12)
- Bounding Cyber Power: Escalation and Restraint in Global Cyberspace (2013) (11)
- 2 Control and Subversion in Russian Cyberspace (2010) (11)
- Internet Filtering in Burma in 2005: A Country Study (2005) (11)
- Advancing Human Rights-by-Design in the Dual-Use Technology Industry (2018) (11)
- Communities @ Risk: Targeted Digital Threats Against Civil Society (2014) (11)
- Virtual Resources: International Relations Research Resources on the Web (1998) (11)
- Deep Probe: The Evolution of Network Intelligence (2003) (10)
- We Chat, They Watch: How International Users Unwittingly Build up WeChat’s Chinese Censorship Apparatus (2020) (9)
- Burned After Reading: Endless Mayfly’s Ephemeral Disinformation Campaign (2019) (9)
- Blurred Boundaries: Probing the Ethics of Cyberspace Research (2011) (9)
- Contesting Cyberspace and the Coming Crisis of Authority (2011) (9)
- The Road to Digital Unfreedom (2018) (8)
- The Information Security Cultures of Journalism (2020) (8)
- Filtering and the International System: A Question of Commitment (2008) (8)
- Information Controls During Military Operations: The case of Yemen during the 2015 political and armed conflict (2015) (8)
- Installing Fear: A Canadian Legal and Policy Analysis of Using, Developing, and Selling Smartphone Spyware and Stalkerware Applications (2019) (7)
- Typographica: The medium and the medieval-to-modern transformation (1996) (7)
- WUP! There It Is: Privacy and Security Issues in QQ Browser, (2016) (7)
- Internet Filtering in Singapore in 2004-2005: A Country Study (2005) (6)
- Cyber Wars (2010) (6)
- Internet Filtering in the United Arab Emirates in 2004-2005: A Country Study (2005) (6)
- Privacy and Security Issues in BAT Web Browsers (2016) (5)
- Trajectories for Future Cybersecurity Research (2018) (5)
- Routing Gone Wild: Documenting Upstream Filtering in Oman via India (2012) (5)
- Electronic privacy and surveillance (2014) (4)
- Mutual entanglement and complex sovereignty in cyberspace (2019) (3)
- Hypermedia : modes of communication in world order transformation (1995) (3)
- Firewalls and Power: An Overview of Global State Censorship of the Internet (2016) (3)
- NSO Group Infrastructure Linked to Targeting of Amnesty International and Saudi Dissident (2018) (3)
- Democratization and Development (2010) (3)
- Permission to Spy: An Analysis of Android Malware Targeting Tibetans (2013) (3)
- Censors Get Smart: Evidence from Psiphon in Iran (2019) (3)
- Canada and the Challenges of Cyberspace Governance and Security (2013) (3)
- Introducing Next-Generation Information Access Controls (2)
- Analysis of the Communications Security Establishment Act and Related Provisions in Bill C-59 (an Act Respecting National Security Matters), First Reading (2017) (2)
- Sex, social mores, and keyword filtering: Microsoft Bing in the 'Arabian Countries' (2010) (2)
- Psychological Biases in Counterfactual Thought Experiments (2020) (2)
- Access Contested: Security, Identity, and Resistance in Asian Cyberspace (2011) (2)
- Information Operations and Tibetan Rights in the Wake of Self-Immolations (2012) (2)
- Subversion Inc: The Age of Private Espionage (2022) (2)
- The Kingdom Came to Canada: How Saudi-Linked Digital Espionage Reached Canadian Soil (2018) (1)
- Reckless VII: Wife of Journalist Slain in Cartel-Linked Killing Targeted with NSO Group’s Spyware (2019) (1)
- A Tale of Two Cyber Conflicts – Civil Society and Commercial Threat Reporting 1 (2019) (1)
- 20. Who Knows What Evils Lurk in the Shadows (2015) (1)
- Data Fusion Methodology and the Geopolitics of Cyberspace (2011) (1)
- Trouble at the border: China’s internet (2013) (0)
- The Biases of Information Security Research (2020) (0)
- 17. Digital Threats Against Journalists (2017) (0)
- Investigating targeted espionage: Methods, findings, implications (2021) (0)
- Introduction to the Country Profiles (2011) (0)
- The Subversive Trilemma (2021) (0)
- Coalition Letter to President Obama Urging Support for Encryption (2015) (0)
- Integrated Security: The Protection of Planetary Networks (2022) (0)
- New thinking and the Angola-Namibia accords Soviet theory and practice in the Third World (1990) (0)
- Review: The Global Political Economy of Communications (1997) (0)
- Post-Realism: The Rhetorical Turn in International Relations. Edited by Beer Francis A. and Hariman Robert. East Lansing: Michigan State University Press, 1996. 429p. $35.95 cloth, $24.95 paper. (1998) (0)
- Blogging dangerously (2010) (0)
- A Perfect Storm in Cyberspace (2012) (0)
- Behind Blue Coat: An Update from Burma (2011) (0)
- Nobody Knows Anything: Canada's Cyber Insecurities (2012) (0)
- Measuring Online Information Controls: From Theory to Practice (2015) (0)
- ONI-Asia phase 1 final report (2007) (0)
- The Virtual Absence of Malice: Cyber Security and Threat Politics (2009) (0)
- International Organization and Cybergovernance (2010) (0)
- SUNY SERIES IN GLOBAL POLITICS INFORMATION TECHNOLOGIES AND GLOBAL POLITICS (2004) (0)
- Notes on the Contributors (1996) (0)
- Review: General: Critical Security Studies (1998) (0)
- Spoofing the European Parliament: Analysis of the Repurposing of Legitimate Content in Targeted Malware Attacks (2012) (0)
This paper list is powered by the following services:
Other Resources About Ronald Deibert
What Schools Are Affiliated With Ronald Deibert?
Ronald Deibert is affiliated with the following schools: