George R. S. Weir   home

Cybercrime, Computer Security and Digital Forensics

Relevant publications (Mostly available from the Publications link above)

Edited works

    1. Barry Cartwright, George R S Weir and Laurie Y-C Lau (Eds.), Proceedings of the 2016 IEEE International Conference on Cybercrime and Computer Forensics (ICCCF 2016), Vancouver, IEEE, 2016.
    2. George R.S. Weir, 'The Internet of Things: Promise of a Better Connected World', in P. Hehenberger and D. Bradley (Eds), Mechatronic Futures: Challenges and Solutions for Mechatronic Systems and their Designers, Springer, 2016.
    3. George R.S. Weir, 'The Limitations of Automating OSINT: Understanding the Question, Not the Answer', in R. Layton and P. Watters (Eds), Automating Open Source Intelligence, 159-169, Elsevier, 2015.
    4. George R.S. Weir, 'Quantifying and neutralising sexually explicit language'. in R Smith, RC-C Cheung & L Lau Yiu-Chung (eds), Cybercrime Risks and Responses: Eastern and Western Perspectives, 121-129, Palgrave MacMillan, 2015.
    5. Ameer Al-Nemrat, George R.S. Weir (Eds), Special issue on Cybercrime Prevention, Detection and Response, Int. J. Electronic Security and Digital Forensics, Vol. 5, No. 2, 2013.
    6. George R.S. Weir, Michael Daley (Eds), Cyberforensics Perspectives, Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013), 2013.
    7. George R.S. Weir, Ameer Al-Nemrat (Eds), Issues in Cybercrime, Security and Digital Forensics, Proceedings of the 2nd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2012), 2012.
    8. George R.S. Weir (Ed.), Cyberforensics : Issues and Perspectives, Proceedings of the 1st International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2011), 2011.
    9. G. R. S. Weir and S. Mason, Sources of Evidence. Chapter 1, in Digital Evidence. Lexis Nexis. ed. 3, 2012. pp. 1-25. (Review from Jurimetrics, The Journal of Law, Science, and Technology, Volume 53, Number 4, (Summer 2013))

    Journal Papers, Conference Papers and Book Chapters

    1. Fabian Suß, Marco Freimuth, Andreas Aßmuth, George Weir, and Robert Duncan, Cloud Security and Security Challenges Revisited, Tenth International Conference on Cloud Computing, GRIDs, and Virtualization, 2019.
    2. Barry Cartwright, George R S Weir, Lutfun Nahar, Karmvir Padda and Richard Frank, The Weaponization of Cloud-based Social Media: Prospects for Legislation and Regulation, Tenth International Conference on Cloud Computing, GRIDs, and Virtualization, 2019.
    3. Barry Cartwright, George R S Weir, and Richard Frank, Fighting Disinformation Warfare with Artificial Intelligence, Tenth International Conference on Cloud Computing, GRIDs, and Virtualization, 2019.
    4. Barry Cartwright, George R S Weir, and Richard Frank, Cyberterrorism in the Cloud, in Security, Privacy, and Digital Forensics in the Cloud, Lei Chen, Hassan Takabi and Nhien-An Le-Khac (Eds.), pp. 217-237, Wiley, 2019.
    5. Yazeed Alkhurayyif and George R S Weir, Using sequential exploratory mixed methods design to explore readability of ISPs, 4 Mar 2019, 2018 International Conference on Computing, Electronics & Communications Engineering (iCCECE). Excell, P. S., Ali, M., Jones, A., Soomro, S. & Miraz, M. H. (eds.). Piscataway, NJ: IEEE, p. 123-127.
    6. George Weir, Andreas Aßmuth, Nicholas Jäger, Forensic Recovery and Intrusion Monitoring in the Cloud, International Journal On Advances in Security, v 11 n 3&4, pp 264-273, 2018.
    7. Kolade Owoeye & George R S Weir, Classification of Radical Web Text using a Composite-Based Method, IEEE International Conference on Computational Science and Computational Intelligence, 2018.
    8. Kolade Owoeye & George R S Weir, Classification of Extremist Text on the Web using Sentiment Analysis Approach, IEEE International Conference on Computational Science and Computational Intelligence, 2018.
    9. Samar Albladi and George R S Weir, A Semi-Automated Security Advisory System to Resist Cyber-attack in Social Networks, International Conference on Computational Collective Intelligence (ICCCI 2018), 2018.
    10. George R S Weir, Kolade Owoeye, Alice Oberacker and Haya Alshahrani, Cloud-based textual analysis as a basis for document classification, The 7th International Workshop on Security, Privacy and Performance in Cloud Computing (SPCLOUD 2018), 2018.
    11. Samar Albladi and George R S Weir, User Characteristics that Influence Judgment of Social Engineering Attacks in Social Networks, Human-centric Computing and Information Sciences, 2018.
    12. George R S Weir, Andreas Aßmuth and Nicholas Jäger, Managing Forensic Recovery in the Cloud, Cloud Computing 2018, The Ninth International Conference on Cloud Computing, GRIDs, and Virtualization, IARIA, Barcelona, Spain, February 2018.
    13. Mahmoud Nasreldin, Heba Aslan, Mohamed Rasslan and George Weir, Evidence Acquisition in Cloud Forensics, IEEE International Conference on New Paradigms in Electronics & Information Technology (PEIT'17), 5 - 8 November 2017, Alexandria, Egypt.
    14. Haya Mesfer Alshahrani and George R S Weir, Hybrid Arabic Text Steganography, International Journal of Computer and Information Technology, Vol.6 issue 6 (November 2017), 2017.
    15. Yazeed Alkhurayyif and George R S Weir, Evaluating Readability as a Factor in Information Security Policies, in International Conference on Arts, Science and Technology, Dubai (ICAST-2017).
    16. S. M. Albladi and G. R. S. Weir, Personality Traits and Cyber-Attack Victimisation : Multiple Mediation Analysis, in Joint 13th CTTE and 10th CMI Conference on Internet of Things – Business Models, Users, and Networks. Copenhagen, Denmark, 2017.
    17. Yazeed Alkhurayyif and George R S Weir, Readability as a Basis for Information Security Policy Assessment, Seventh IEEE International Conference on Emerging Security Technologies, Canterbury, UK, September 2017.
    18. George Weir, Andreas Aßmuth, Mark Whittington and Bob Duncan, Cloud Accounting Systems, the Audit Trail, Forensics and the EU GDPR: How Hard Can It Be?, in British Accountancy and Finance Association Conference, Aberdeen, August 2017.
    19. George R S Weir and Andreas Aßmuth, Strategies for Intrusion Monitoring in Cloud Services, Cloud Computing 2017, The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization, IARIA, Athens, Greece, February 2017.
    20. Fathiya Al Izki and George Weir, Management Attitudes Toward Information Security in Omani Public Sector Organisations, Cybersecurity and Cyberforensics Conference (CCC 2016), University of Jordan, Jordan, IEEE.
    21. Karen Renaud and George Weir, Cybersecurity and the Unbearability of Uncertainty, Cybersecurity and Cyberforensics Conference (CCC 2016), University of Jordan, Jordan, IEEE.
    22. Andreas Aßmuth, Paul Cockshott, Jana Kipke, Karen Renaud, Lewis Mackenzie, Wim Vanderbauwhede, Matthias Soellner, Tilo Fischer and George Weir, Improving Resilience by Deploying Permuted Code onto Physically Unclonable Unique Processors, Cybersecurity and Cyberforensics Conference (CCC 2016), University of Jordan, Jordan, IEEE.
    23. G.R.S. Weir, R. Frank, B. Cartwright and E. Dos Santos, Positing The Problem: Enhancing Classification of Extremist Web Content Through Textual Analysis, International Conference on Cybercrime and Computer Forensics 2016 (ICCCF 2016), Vancouver, Canada, IEEE.
    24. Najla Etaher and George R S Weir, Understanding children’s mobile device usage, International Conference on Cybercrime and Computer Forensics 2016 (ICCCF 2016), Vancouver, Canada, IEEE.
    25. Samar Albladi and George R S Weir, Vulnerability to Social Engineering in Social Networks: A Proposed User-Centric Framework, International Conference on Cybercrime and Computer Forensics 2016 (ICCCF 2016), Vancouver, Canada, IEEE.
    26. Najla Etaher, George R S Weir and Mamoun Alazab, From ZeuS to Zitmo: Trends in Banking Malware, TrustCom 2015: The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Helsinki, Finland, 2015, pp 1386-1391.
    27. Fathiya Al Izki and George R S Weir, Gender Impact on Information Security in the Arab World, ICGS3-15, 10th International conference on Global Security, Safety and Sustainability, London, 2015.
    28. Gregor Robinson and George R S Weir, Understanding Android Security, ICGS3-15, 10th International conference on Global Security, Safety and Sustainability, London, 2015.
    29. Fathiya Al Izki and George R S Weir, Information Security and Digital Divide in the Arab World, Proceedings of Cyberforensics 2014, pp 15-24, University of Strathclyde, June 2014.
    30. Richard Connor, Stewart Mackenzie-Leigh and George R S Weir, The forensic detection of very similar images, Proceedings of Cyberforensics 2014, pp 26-32, University of Strathclyde, June 2014.
    31. Katherine Darroch and George R S Weir, Measuring sexually explicit content, Proceedings of Cyberforensics 2014, pp 101-112, University of Strathclyde, June 2014.
    32. Najla Etaher and George R S Weir, Understanding the Threat of Banking Malware, Proceedings of Cyberforensics 2014, pp 73-80, University of Strathclyde, June 2014.
    33. George R S Weir and David Igbako, Strategies for Covert Web Search, Proceedings of CTC 2013 : 4th Cybercrime and Trustworthy Computing Workshop, Sydney, Australia, 2013.
    34. George R S Weir and Christopher Forbes, Quantifying Sexually Explicit Language, International Conference on Cybercrime and Computer Forensic (ICCCF 2013), Hong Kong, China, 2013.
    35. George R S Weir and Richard Connor, The importance of image similarity for criminal investigation, Presented at Cyberforensics 2013, Cardiff, UK.
    36. A. Odueke and G. R. S. Weir, Triage in Forensic Accounting using Zipf's Law. In Issues in Cybercrime, Security and Digital Forensics. Edited by G. R. S. Weir and A. Al-Nemrat. Glasgow. University of Strathclyde Publishing. 2012. pp. 33-43.
    37. R. Ogilvie and G. R. S. Weir, Genre-Based Information Hiding. In ICGS3/e-Democracy 2011. Edited by R. Bashroush. LNICST 99, Springer. 2012. pp. 104-111.
    38. G. R. S. Weir and A. M. Duta, Strategies for neutralising sexually explicit language. Proceedings of CTC 2012 : 3rd Cybercrime and Trustworthy Computing Workshop. University of Ballarat. 2012.
    39. G. R. S. Weir and G. Rossi, Toward Music-Based Data Discrimination for Cybercrime Investigations. In Cyberforensics: Issue and Perspectives. Edited by G. R. S. Weir. University of Strathclyde Publishing. 2011. pp. 229-235.
    40. A. Lazou and G. R. S. Weir, Perceived Risk and Sensitive Data on Mobile Devices. In Cyberforensics: Issue and Perspectives. Edited by G. R. S. Weir. Glasgow, UK. University of Strathclyde Publishing. 2011. pp. 183-196.
    41. O. Gellineau and G. R. S. Weir, Classifying suspicious content using frequency analysis. Corpora and Language Technologies in Teaching, Learning and Research. ICTATLL. 2011.
    42. G. R. S. Weir, F. Toolan, and D. Smeed, The Threats of Social Networking: Old Wine in New Bottles?. Information Security Technical Report. vol. 16. 2011. pp. 38-43.
    43. M. Morran and G. R. S. Weir, An Approach to Textual Steganography. In ICGS3 2010 (Communications in Computer and Information Science 92). Edited by S. Tenreiro de Magalhaes, H. Jahankhani, and A. G. Hessami. Berlin Heidelberg. Springer-Verlag. 2010. pp. 48–54.
    44. G. R. S. Weir and M. Morran, Hiding the Hidden Message: Approaches to Textual Steganography. International Journal of Electronic Security and Digital Forensics. 3 (3). 2010. pp. 223-233.
    45. S. Garrity and G. R. S. Weir, Balancing the threat of personal technology in the workplace. International Journal of Electronic Security and Digital Forensics. 3 (1). 2010. pp. 73-81.
    46. I. Moir and G. R. S. Weir, Contact centres and identity theft. International Journal of Electronic Security and Digital Forensics. 2 (1). 2009. pp. 92-100.
    47. M. O’Brien and G. R. S. Weir, Understanding digital certificates. Proceedings of the 2nd International Conference on Cybercrime Forensics Education and Training. Canterbury, UK. September 2008.
    48. S. Burns and G. R. S. Weir, Varieties of smartcard fraud. International Journal of Electronic Security and Digital Forensics. 1 (4). 2008. pp. 374-386.
    49. C. Cranston and G. R. S. Weir, Anti-Phishing as a Web-Based User Service. Proceedings of e-commerce 2006. IADIS. December 2006.
    50. G. R. S. Weir and N. Zonidis, Desktop Security as a Three-dimensional Problem. KMITL Science Journal. 5 (1). February 2005. pp. 292-302.

    Fuller publication list

    External engagement

    1. Adjunct Professor, School of Criminology, Simon Fraser University, Burnaby, Canada (2018-2020).
    2. Editorial board member, International Journal for Information Security Research (IJISR)
    3. Visiting professor, School of Criminology, Simon Fraser University, Burnaby, Canada (January-May, 2016).
    4. External examiner, MSc Forensic Computing and Cybercrime Investigation, Centre for Cybersecurity and Cybercrime Investigation, School of Computer Science and Informatics, UCD, Ireland (2014-2017).
    5. Technical Programme Committee Chair, 4th International Conference on Cybercrime and Digital Forensics, Vancouver, June, 2016.
    6. Senior Research Affiliate, Canadian Network for Research on Terrorism, Security and Society.
    7. Member, International Cybercrime Research Centre, Simon Fraser University, Vancouver, Canada (September 2014).
    8. Invited talk, The Internet of Things: Building a Connected World, British Science Association, Dundee, January 2015.
    9. Seminar, Strategies for Covert Web Search, Australian Institute of Criminology, Canberra, Australia (18th November, 2013).
    10. Co-opted member, E-crime subgroup of the Scottish Financial Crime Group (organised by the Scottish Business Crime Centre).
    11. General Chair, 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013), University of Cardiff, June 2013.
    12. International Program Committee Chair, International Conference on CyberCrime and Computer Forensic 2013, 25-28 August 2013, Hong Kong.
    13. Committee Member, UK Chapter of the Association of Certified Fraud Examiners.
    14. International Editorial Board Member, International Journal of Information Security Science.
    15. International Editorial Board Member, International Journal for Information Security Research.
    16. International Editorial Board Member, Interconexões: Revista de Ciências Sociais.
    17. Technical Committee Member, The Fourth International Conference on Technical and Legal Aspects of the e-Society (CYBERLAWS 2013), February 24 - March 1, 2013 - Nice, France.
    18. Program Committee Member, e-Commerce 2013, IADIS International Conference, 24 – 26 July, 2013 - Prague, Czech Republic.
    19. Keynote speaker, International Conference on Advances in ICT for Emerging Regions (ICTer 2012), Colombo, Sri Lanka, December 2012.
    20. Program Committee Member, 3rd Cybercrime and Trustworthy Computing Workshop (CTC 2012), University of Ballarat, Australia, October 2012.
    21. Invited speaker, The Inaugural Cyber Crime Symposium, Sydney, Australia, 1-2 March 2012.
    22. General Chair, 2nd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2012), University of East London, May 2012.
    23. Visiting Lecturer, School of Computing, University of Colombo, Sri Lanka, 2011 - present (Contributing to the MSc in Information Security.)
    24. General Chair, 1st International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2011), University of Strathclyde, June 2011.
    25. Awarded funding by the Institute for Advanced Studies to support a programme of events entitled 'Cybercrime: A Threat to All' (2010).

    PhD supervision

    PhD external supervision

    PhD external examining

    Undergraduate projects (examples)