George R. S. Weir

According to our database1, George R. S. Weir authored at least 36 papers between 1996 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Predicting individuals' vulnerability to social engineering in social networks.
Cybersecur., 2020

2019
A Conceptual Model to Predict Social Engineering Victims.
Proceedings of the 12th IEEE International Conference on Global Security, 2019

2018
User characteristics that influence judgment of social engineering attacks in social networks.
Hum. centric Comput. Inf. Sci., 2018

A Semi-automated Security Advisory System to Resist Cyber-Attack in Social Networks.
Proceedings of the Computational Collective Intelligence - 10th International Conference, 2018

2017
Competence measure in social networks.
Proceedings of the International Carnahan Conference on Security Technology, 2017

Readability as a basis for information security policy assessment.
Proceedings of the Seventh International Conference on Emerging Security Technologies, 2017

2016
Cybersecurity and the Unbearability of Uncertainty.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2016

Management Attitudes toward Information Security in Omani Public Sector Organisations.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2016

Improving Resilience by Deploying Permuted Code onto Physically Unclonable Unique Processors.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2016

2015
From ZeuS to Zitmo: Trends in Banking Malware.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Understanding Android Security.
Proceedings of the Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security, 2015

Gender Impact on Information Security in the Arab World.
Proceedings of the Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security, 2015

2011
The threats of social networking: Old wine in new bottles?
Inf. Secur. Tech. Rep., 2011

Genre-Based Information Hiding.
Proceedings of the Global Security, Safety and Sustainability & e-Democracy, 2011

2010
Hiding the hidden message: approaches to textual steganography.
Int. J. Electron. Secur. Digit. Forensics, 2010

Balancing the threat of personal technology in the workplace.
Int. J. Electron. Secur. Digit. Forensics, 2010

An Approach to Textual Steganography.
Proceedings of the Global Security, Safety, and Sustainability, 2010

2009
Contact centres and identity theft.
Int. J. Electron. Secur. Digit. Forensics, 2009

2008
Varieties of smartcard fraud.
Int. J. Electron. Secur. Digit. Forensics, 2008

2007
Optimising content clarity for human-machine systems.
Proceedings of the 10th IFAC/IFIP/IFORS/IEA Symposium on Analysis, 2007

2005
Difficulties teaching Java in CS1 and how we aim to solve them.
Proceedings of the 10th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2005

2004
Content Enrichment Through Dynamic Annotation.
Proceedings of the ICEIS 2004, 2004

BulB - Visualising Bulletin Board Activity.
Proceedings of the ICEIS 2004, 2004

2003
Subtitled interaction: complementary support as an alternative to localization.
Int. J. Hum. Comput. Stud., 2003

Tools for Second Language Support.
Proceedings of the Human-Computer Interaction: Universal Access in HCI: Inclusive Design in the Information Society, 2003

2002
The Rigours of On-Line Student Assessment - Lessons from E-Commerce.
Proceedings of the International Conference on Computers in Education, 2002

Serving Enhanced Hypermedia Information.
Proceedings of the Advances in Information Retrieval, 2002

2001
Novel Data Visualisation and Exploration in Multidimensional Datasets.
Proceedings of the ICEIS 2001, 2001

English Assistant: A Support Strategy for On-Line Second Language Learning.
Proceedings of the Proceedings IEEE International Conference on Advanced Learning Technology: Issues, 2001

Localisation and linguistic anomalies.
Proceedings of the Universal Access In HCI: Towards an Information Society for All, 2001

2000
Managing Educational Web-dependence.
Proceedings of WebNet 2000 - World Conference on the WWW and Internet, San Antonio, Texas, USA, October 30, 2000

Design and Deployment Decisions within an E-Commerce Environment.
Proceedings of WebNet 2000 - World Conference on the WWW and Internet, San Antonio, Texas, USA, October 30, 2000

1999
It's not Greek to me: terminology and the second language problem.
ACM SIGCHI Bull., 1999

Web Centric Education - a Challenge for Process Redesign.
Proceedings of WebNet 99, 1999

Estimating the Number of Defects at a WWW Site.
Proceedings of WebNet 99, 1999

1996
Second-Language Help for Windows Applications.
Proceedings of the People and Computers XI, Proceedings of HCI '96, 1996


  Loading...