1985 …2023

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Article
2018
Open Access
File
12 Citations (Scopus)
56 Downloads (Pure)
2017

Hybrid Arabic text steganography

Alshahrani, H. M. S. & Weir, G., 30 Nov 2017, In : International Journal of Computer and Information Technology. 6, 6, p. 329-338 10 p., 6.

Research output: Contribution to journalArticle

Open Access
File
22 Downloads (Pure)
2012

Genre-based information hiding

Ogilvie, R. & Weir, G. R. S., 7 Nov 2012, In : Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering. 99, p. 104-111 8 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2011

The threats of social networking: old wine in new bottles?

Weir, G., Toolan, F. & Smeed, D., May 2011, In : Information Security Technical Report. 16, 2, p. 38-43 6 p.

Research output: Contribution to journalArticle

File
20 Citations (Scopus)
580 Downloads (Pure)
2010

A software application for assessing readability in the Japanese EFL context

Ozasa, T., Weir, G. & Fukui, M., 2010, In : Themes in Science and Technology Education. 3, 1-2, p. 91-118 28 p.

Research output: Contribution to journalArticle

Balancing the threat of personal technology in the workplace

Garrity, S. & Weir, G. R. S., 2010, In : International Journal of Electronic Security and Digital Forensics. 3, 1, p. 73-81 9 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Hiding the hidden message: approaches to textual steganography

Weir, G. R. S. & Morran, M., 2010, In : International Journal of Electronic Security and Digital Forensics. 3, 3, p. 223-233 11 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Learning from Analysis of Japanese EFL Texts

Weir, G. R. S. & Ozasa, T., 2010, In : Educational Perspectives, Journal of the College of Education/University of Hawaii at Manoa. 43, 1 & 2, p. 56-66 11 p.

Research output: Contribution to journalArticle

Open Access
File
61 Downloads (Pure)
2009

Contact centres and identity theft

Moir, I. & Weir, G. R. S., 2009, In : International Journal of Electronic Security and Digital Forensics. 2, 1, p. 92-100 9 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2005

Desktop security as a three-dimensional problem

Weir, G. R. S. & Zonidis, N., 2005, In : KM ITL science and technology journal . 5, 1, p. 292-302 10 p.

Research output: Contribution to journalArticle

File
83 Downloads (Pure)
2003
Open Access
File
1 Citation (Scopus)
10 Downloads (Pure)

Meaningful interaction in complex man-machine systems

Weir, G. R. S., 3 Mar 2003, In : Reliability Engineering and System Safety. 38, 1/2, p. 151-156 5 p.

Research output: Contribution to journalArticle

Subtitled interaction: complementary support as an alternative to localization

Lepouras, G. & Weir, G. R. S., 2003, In : International Journal of Human Computer Studies. 59, 6, p. 941-957 16 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
1999

It's not Greek to me: terminology and the second language problem

Lepouras, G. & Weir, G. R. S., 1999, In : ACM SIGCHI Bulletin. 31, 2, p. 17-24 7 p.

Research output: Contribution to journalArticle

1988

Learning from a plan-based interface

Weir, G., Jan 1988, In : Computers and Education. 12, 1, p. 247-251 5 p.

Research output: Contribution to journalArticle

60 Downloads (Pure)
1985

Sitting on Ryle's dilemma

Weir, G. R. S., Mar 1985, In : Philosophical Studies. 47, 2, p. 295-303 9 p.

Research output: Contribution to journalArticle