{"id":"https://openalex.org/W3130566979","doi":"https://doi.org/10.1093/cybsec/tyaa026","title":"Manipulating uncertainty: cybersecurity politics in Egypt","display_name":"Manipulating uncertainty: cybersecurity politics in Egypt","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3130566979","doi":"https://doi.org/10.1093/cybsec/tyaa026","mag":"3130566979"},"language":"en","primary_location":{"id":"doi:10.1093/cybsec/tyaa026","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyaa026","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/7/1/tyaa026/36276523/tyaa026.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://academic.oup.com/cybersecurity/article-pdf/7/1/tyaa026/36276523/tyaa026.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069682618","display_name":"Bassant Hassib","orcid":"https://orcid.org/0000-0003-3618-6428"},"institutions":[{"id":"https://openalex.org/I154023281","display_name":"British University in Egypt","ror":"https://ror.org/0066fxv63","country_code":"EG","type":"education","lineage":["https://openalex.org/I154023281"]}],"countries":["EG"],"is_corresponding":true,"raw_author_name":"Bassant Hassib","raw_affiliation_strings":["Department of Political Science, British University in Egypt, Suez Desert Road, El Sherouk City, Cairo, 11837, Egypt"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Political Science, British University in Egypt, Suez Desert Road, El Sherouk City, Cairo, 11837, Egypt","institution_ids":["https://openalex.org/I154023281"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032141357","display_name":"James Shires","orcid":"https://orcid.org/0000-0002-7481-4037"},"institutions":[{"id":"https://openalex.org/I2801375708","display_name":"Hague Institute for Global Justice","ror":"https://ror.org/0363anr51","country_code":"NL","type":"nonprofit","lineage":["https://openalex.org/I2801375708"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"James Shires","raw_affiliation_strings":["Institute of Security and Global Affairs, University of Leiden, Turfmarkt 99, Den Haag, 2511DP, The Netherlands"],"raw_orcid":"https://orcid.org/0000-0002-7481-4037","affiliations":[{"raw_affiliation_string":"Institute of Security and Global Affairs, University of Leiden, Turfmarkt 99, Den Haag, 2511DP, The Netherlands","institution_ids":["https://openalex.org/I2801375708"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5069682618"],"corresponding_institution_ids":["https://openalex.org/I154023281"],"apc_list":{"value":1864,"currency":"USD","value_usd":1864},"apc_paid":{"value":1864,"currency":"USD","value_usd":1864},"fwci":6.7038,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.96393266,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"7","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10557","display_name":"Social Media and Politics","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/3315","display_name":"Communication"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/contest","display_name":"CONTEST","score":0.7115802764892578},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6593140959739685},{"id":"https://openalex.org/keywords/politics","display_name":"Politics","score":0.6333993673324585},{"id":"https://openalex.org/keywords/opposition","display_name":"Opposition (politics)","score":0.6259299516677856},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5352310538291931},{"id":"https://openalex.org/keywords/government","display_name":"Government (linguistics)","score":0.46505412459373474},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.4067724645137787},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.3815489709377289},{"id":"https://openalex.org/keywords/political-economy","display_name":"Political economy","score":0.3707073926925659},{"id":"https://openalex.org/keywords/law-and-economics","display_name":"Law and economics","score":0.36482465267181396},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.3272174000740051},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.2717364430427551},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.24777936935424805}],"concepts":[{"id":"https://openalex.org/C2777582232","wikidata":"https://www.wikidata.org/wiki/Q5013414","display_name":"CONTEST","level":2,"score":0.7115802764892578},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6593140959739685},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.6333993673324585},{"id":"https://openalex.org/C2780668109","wikidata":"https://www.wikidata.org/wiki/Q192852","display_name":"Opposition (politics)","level":3,"score":0.6259299516677856},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5352310538291931},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.46505412459373474},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.4067724645137787},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.3815489709377289},{"id":"https://openalex.org/C138921699","wikidata":"https://www.wikidata.org/wiki/Q47555","display_name":"Political economy","level":1,"score":0.3707073926925659},{"id":"https://openalex.org/C190253527","wikidata":"https://www.wikidata.org/wiki/Q295354","display_name":"Law and economics","level":1,"score":0.36482465267181396},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.3272174000740051},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.2717364430427551},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.24777936935424805},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1093/cybsec/tyaa026","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyaa026","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/7/1/tyaa026/36276523/tyaa026.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:scholarlypublications.universiteitleiden.nl:item_3282050","is_oa":true,"landing_page_url":"https://hdl.handle.net/1887/3282050","pdf_url":null,"source":{"id":"https://openalex.org/S4306400850","display_name":"Leiden Repository (Leiden University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I121797337","host_organization_name":"Leiden University","host_organization_lineage":["https://openalex.org/I121797337"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cybersecurity","raw_type":"Article / Letter to editor"},{"id":"pmh:ul:oai:scholarlypublications.universiteitleiden.nl:item_3282050","is_oa":true,"landing_page_url":"http://hdl.handle.net/1887/3282050","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cybersecurity, 7(1). Oxford University Press (OUP)","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"doi:10.1093/cybsec/tyaa026","is_oa":true,"landing_page_url":"https://doi.org/10.1093/cybsec/tyaa026","pdf_url":"https://academic.oup.com/cybersecurity/article-pdf/7/1/tyaa026/36276523/tyaa026.pdf","source":{"id":"https://openalex.org/S2735156331","display_name":"Journal of Cybersecurity","issn_l":"2057-2085","issn":["2057-2085","2057-2093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7799999713897705}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3130566979.pdf","grobid_xml":"https://content.openalex.org/works/W3130566979.grobid-xml"},"referenced_works_count":118,"referenced_works":["https://openalex.org/W16762874","https://openalex.org/W80269700","https://openalex.org/W81914187","https://openalex.org/W190623344","https://openalex.org/W314408679","https://openalex.org/W357259229","https://openalex.org/W361024655","https://openalex.org/W591711272","https://openalex.org/W597872102","https://openalex.org/W648290933","https://openalex.org/W656475291","https://openalex.org/W828756634","https://openalex.org/W891793047","https://openalex.org/W958735467","https://openalex.org/W1498500861","https://openalex.org/W1509383136","https://openalex.org/W1561432674","https://openalex.org/W1576087156","https://openalex.org/W1753885524","https://openalex.org/W1895476777","https://openalex.org/W1970197627","https://openalex.org/W1974840411","https://openalex.org/W1977055283","https://openalex.org/W1988514033","https://openalex.org/W2012592974","https://openalex.org/W2012843030","https://openalex.org/W2018995256","https://openalex.org/W2024847495","https://openalex.org/W2029217231","https://openalex.org/W2042993903","https://openalex.org/W2055784661","https://openalex.org/W2059124858","https://openalex.org/W2062199894","https://openalex.org/W2066369819","https://openalex.org/W2069156667","https://openalex.org/W2076744904","https://openalex.org/W2078749624","https://openalex.org/W2098749368","https://openalex.org/W2106213833","https://openalex.org/W2108720779","https://openalex.org/W2112823029","https://openalex.org/W2113627597","https://openalex.org/W2119949427","https://openalex.org/W2124952441","https://openalex.org/W2130894780","https://openalex.org/W2131202466","https://openalex.org/W2132115418","https://openalex.org/W2140382808","https://openalex.org/W2148080793","https://openalex.org/W2153536950","https://openalex.org/W2164304100","https://openalex.org/W2171887288","https://openalex.org/W2263353070","https://openalex.org/W2317885274","https://openalex.org/W2326992605","https://openalex.org/W2330251216","https://openalex.org/W2336501095","https://openalex.org/W2475417377","https://openalex.org/W2479427848","https://openalex.org/W2499907619","https://openalex.org/W2509812483","https://openalex.org/W2523402023","https://openalex.org/W2555951879","https://openalex.org/W2566920031","https://openalex.org/W2575430425","https://openalex.org/W2588205325","https://openalex.org/W2590410524","https://openalex.org/W2607094075","https://openalex.org/W2726968675","https://openalex.org/W2730969747","https://openalex.org/W2734412659","https://openalex.org/W2744815813","https://openalex.org/W2784430245","https://openalex.org/W2787176572","https://openalex.org/W2792157319","https://openalex.org/W2793558735","https://openalex.org/W2799457552","https://openalex.org/W2807924303","https://openalex.org/W2808409774","https://openalex.org/W2889048114","https://openalex.org/W2890634085","https://openalex.org/W2890845033","https://openalex.org/W2892266624","https://openalex.org/W2896921551","https://openalex.org/W2901291314","https://openalex.org/W2904167932","https://openalex.org/W2904220661","https://openalex.org/W2912182718","https://openalex.org/W2913388897","https://openalex.org/W2915627924","https://openalex.org/W2920947217","https://openalex.org/W2944102661","https://openalex.org/W2956021981","https://openalex.org/W2973640317","https://openalex.org/W2983860014","https://openalex.org/W2984608498","https://openalex.org/W3009690519","https://openalex.org/W3012284744","https://openalex.org/W3097448683","https://openalex.org/W3107084079","https://openalex.org/W3109617317","https://openalex.org/W3121561090","https://openalex.org/W3136983119","https://openalex.org/W4210310438","https://openalex.org/W4233491120","https://openalex.org/W4236723526","https://openalex.org/W4241883733","https://openalex.org/W4241886268","https://openalex.org/W4247764957","https://openalex.org/W4251455783","https://openalex.org/W4253730189","https://openalex.org/W4298177353","https://openalex.org/W4300490511","https://openalex.org/W4301462455","https://openalex.org/W4302780024","https://openalex.org/W6752593193","https://openalex.org/W6758779854","https://openalex.org/W6784569965"],"related_works":["https://openalex.org/W4296210078","https://openalex.org/W3029305658","https://openalex.org/W2325012126","https://openalex.org/W3180291396","https://openalex.org/W2046209100","https://openalex.org/W112384649","https://openalex.org/W2087498783","https://openalex.org/W4223959679","https://openalex.org/W2804595607","https://openalex.org/W4323979978"],"abstract_inverted_index":{"Abstract":[0],"Cybersecurity,":[1],"defined":[2],"as":[3,41,205],"the":[4,44,47,58,77,84,114,144,169,187,201],"prevention":[5],"and":[6,14,28,57,70,79,82,88,96,99,117,132,183,190,212],"mitigation":[7],"of":[8,20,55,61,155,192,203,210],"malicious":[9],"interference":[10],"with":[11],"digital":[12],"devices":[13],"networks,":[15],"is":[16,32],"a":[17,111,206],"key":[18],"area":[19],"contest":[21],"for":[22,113,139],"digitalized":[23],"politics,":[24,216],"especially":[25],"in":[26,38,101,167,214],"uncertain":[27,102],"turbulent":[29],"situations.":[30],"Nowhere":[31],"this":[33],"more":[34,146],"starkly":[35],"illustrated":[36],"than":[37],"states":[39],"such":[40],"Egypt,":[42,168],"where":[43],"period":[45],"since":[46],"January":[48],"2011":[49],"revolution":[50],"has":[51],"seen":[52],"several":[53],"changes":[54],"government":[56,116],"subsequent":[59],"consolidation":[60],"executive":[62],"power,":[63],"increasingly":[64],"strict":[65],"limits":[66],"on":[67,164,221],"free":[68],"speech,":[69],"extensive":[71,161],"violence":[72],"by":[73,83],"Islamist":[74],"groups":[75],"against":[76,86],"state":[78,85,182],"civilian":[80],"targets":[81],"protesters":[87],"dissidents.":[89],"How,":[90],"then,":[91],"are":[92],"cybersecurity":[93,109,129,165,196],"policies,":[94,130],"practices,":[95,131],"technologies":[97,133],"deployed":[98],"contested":[100],"political":[103,179],"environments?":[104],"The":[105],"article":[106,170],"argues":[107],"that":[108,219],"provides":[110],"way":[112],"Egyptian":[115],"opposition":[118,184],"activists":[119],"to":[120,123,134,142,159],"\u201cmanipulate":[121],"uncertainty\u201d":[122],"their":[124,136,152],"advantage.":[125],"Each":[126],"side":[127],"uses":[128],"restrict":[135],"adversary\u2019s":[137],"scope":[138],"action,":[140],"seeking":[141],"make":[143],"other":[145],"predictable":[147],"while":[148],"retaining":[149],"or":[150],"increasing":[151],"own":[153],"freedom":[154],"action.":[156],"In":[157],"addition":[158],"providing":[160],"empirical":[162],"data":[163],"developments":[166],"makes":[171],"two":[172],"theoretical":[173],"contributions.":[174],"First,":[175],"it":[176,199],"shows":[177],"how":[178],"struggles":[180],"between":[181],"movements":[185],"assimilate":[186],"influential":[188],"language":[189],"content":[191],"cybersecurity,":[193],"generating":[194],"distinct":[195],"politics.":[197],"Second,":[198],"highlights":[200],"role":[202],"uncertainty":[204],"driver\u2014among":[207],"others\u2014of":[208],"cycles":[209],"innovation":[211],"response":[213],"contentious":[215],"including":[217],"those":[218],"center":[220],"cybersecurity.":[222]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
