User characteristics that influence judgment of social engineering attacks in social networks SM Albladi, GRS Weir Human-centric Computing and Information Sciences 8, 1-24, 2018 | 142 | 2018 |
A new horizon in learner corpus studies: The aim of the ICNALE project S Ishikawa, G Weir, K Poonpon Korea 404, 89-168, 2011 | 101 | 2011 |
The threats of social networking: Old wine in new bottles? GRS Weir, F Toolan, D Smeed Information security technical report 16 (2), 38-43, 2011 | 88 | 2011 |
From zeus to zitmo: Trends in banking malware N Etaher, GRS Weir, M Alazab 2015 IEEE Trustcom/BigDataSE/ISPA 1, 1386-1391, 2015 | 80 | 2015 |
Predicting individuals’ vulnerability to social engineering in social networks SM Albladi, GRS Weir Cybersecurity 3 (1), 7, 2020 | 72 | 2020 |
From corpus-based collocation frequencies to readability measure NK Anagnostou, GRS Weir ICT in the Analysis, Teaching and Learning of Languages, Preprints of the …, 2006 | 66 | 2006 |
Value and benefits of text mining D McDonald, U Kelly JISC Digital infrastructure, 2012 | 56 | 2012 |
Arabic fake news detection based on textual analysis H Himdi, G Weir, F Assiri, H Al-Barhamtoshy Arabian journal for science and engineering 47 (8), 10453-10469, 2022 | 51 | 2022 |
Cybersecurity and the unbearability of uncertainty K Renaud, GRS Weir 2016 Cybersecurity and Cyberforensics Conference (CCC), 137-143, 2016 | 50 | 2016 |
New challenges in teaching introductory programming courses: a case study I Huet, OR Pacheco, J Tavares, G Weir 34th Annual Frontiers in Education, 2004. FIE 2004., T2H/5-T2H/9 Vol. 1, 2004 | 41 | 2004 |
Human computer interaction and complex systems GRS Weir, JL Alty Academic Press, 1991 | 38 | 1991 |
Positing the problem: enhancing classification of extremist web content through textual analysis GRS Weir, E Dos Santos, B Cartwright, R Frank 2016 ieee international conference on cybercrime and computer forensic …, 2016 | 35 | 2016 |
Vulnerability to social engineering in social networks: a proposed user-centric framework S Albladi, GRS Weir 2016 IEEE International Conference on Cybercrime and Computer Forensic …, 2016 | 34 | 2016 |
Personality traits and cyber-attack victimisation: Multiple mediation analysis SM Albladi, GRS Weir 2017 Internet of Things Business Models, Users, and Networks, 1-6, 2017 | 31 | 2017 |
Exploring newspapers: a case study in corpus analysis GRS Weir, NK Anagnostou Proceedings of ICTATLL 2007, 12-19, 2007 | 26 | 2007 |
Estimating readability with the Strathclyde readability measure GRS Weir, C Ritchie ICT in the Analysis, Teaching and Learning of Languages, Preprints of the …, 2006 | 26 | 2006 |
Cloud accounting systems, the audit trail, forensics and the EU GDPR: how hard can it be? G Weir, A Aßmuth, M Whittington, B Duncan British Accounting & Finance Association (BAFA) Annual Conference 2017, 2017 | 24 | 2017 |
Measuring readability for Japanese learners of English T Ozasa, G Weir, M Fukui Proceedings of the 12th Conference of Pan-Pacific Association of Applied …, 2007 | 24 | 2007 |
Management attitudes toward information security in Omani public sector organisations F Al-Izki, GRS Weir 2016 Cybersecurity and Cyberforensics Conference (CCC), 107-112, 2016 | 23 | 2016 |
The posit text profiling toolset G Weir Proceedings of the 12th Conference of Pan-Pacific Association of Applied …, 2007 | 23 | 2007 |