Issues of Implied Trust in Ethical Hacking G Thomas, O Burmeister, G Low ORBIT Journal 2 (1), 2018 | 29* | 2018 |
Ethical Issues of User Behavioral Analysis through Machine Learning G Thomas, P Duessel, M Meier Journal of Information Systems Security 13 (1), 3-17, 2017 | 15 | 2017 |
The Importance of Ethical Conduct by Penetration Testers in the Age of Breach Disclosure Laws. G Thomas, O Burmeister, G Low Australasian Journal of Information Systems 23, 2019 | 13 | 2019 |
"Who was that masked man?": System penetrations – friend or foe? G Thomas, G Low, O Burmeister Cyber Weaponry: Issues and Implications of Digital Arms (Advanced Sciences …, 2018 | 10 | 2018 |
An ethical hacker can help you beat a malicious one GA Thomas The Conversation, 2017 | 5 | 2017 |
Hacking the terror suspect’s iPhone: what the FBI can do now Apple says ‘no’ GA Thomas The Conversation, 2016 | 3 | 2016 |
Issues of professionalism concerning the ethical hacking of law firms G Thomas Charles Sturt University, 2020 | 2 | 2020 |
On the offensive: is ‘hacking back’ ethical? G Thomas 2017 Higher Degree Research Symposium, 18-20, 2017 | 2 | 2017 |
Professional Ethics Involving Cyber Security and Autonomous Robots O Burmeister, G Thomas, A Poulsen Information, Communication, and Automation Ethics in the Knowledge Society Age, 2018 | 1 | 2018 |
Cyber Terrorism and Organized Crime G Thomas Cyber Laundering: International Policies and Practices, 175-193, 2023 | | 2023 |
Discussing Regulation for Ethical Hackers G Thomas Regulating Cyber Technologies; Privacy vs. Security, 315-333, 2023 | | 2023 |
Discussing Privacy and Ethical Issues of Encryption in a Connected World G Thomas Proceedings of the 9th conference of the Australian Institute of Computer Ethics, 2020 | | 2020 |
Penetrations—Friend or Foe? G Thomas, G Low, O Burmeister Cyber Weaponry: Issues and Implications of Digital Arms, 113, 2018 | | 2018 |
Erratum to:“Who Was That Masked Man?”: System Penetrations—Friend or Foe? G Thomas, G Low, O Burmeister Cyber Weaponry, E1-E1, 2018 | | 2018 |
Codes and Keys; What, How, and Why to encrypt G Thomas ILTA Peer to Peer, 22-25, 2017 | | 2017 |