• 64 Citations
  • 1 h-Index

Research output per year

If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Georg Thomas is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 2 Similar Profiles

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output

  • 64 Citations
  • 1 h-Index
  • 4 Article
  • 1 Chapter in textbook/reference book
  • 1 Conference paper
  • 1 Chapter (peer-reviewed)
  • Open Access
  • 18 Downloads (Pure)

    Professional ethics involving cyber security and autonomous robots

    Burmeister, O. K., Thomas, G. & Poulsen, A., Oct 2018, Information, communication and automation ethics in the knowledge society age: Ethical issues in the 21st Century. Tzafestas, S. G. (ed.). 1st ed. New York: Nova Science Publishers, p. 167-180 14 p.

    Research output: Book chapter/Published conference paperChapter (peer-reviewed)

  • "Who was that masked man"? System penetrations - friend or foe?

    Thomas, G., Low, G. & Burmeister, O., 2018, Cyber weaponry: Issues and implications of digital arms. Prunckun, H. (ed.). Cham, Switzerland: Springer, p. 113-124 12 p. (Advanced Sciences and Technologies for Security Applications).

    Research output: Book chapter/Published conference paperChapter in textbook/reference book

  • Issues of Implied Trust in Ethical Hacking

    Thomas, G., Burmeister, O. & Low, G., 2017, Proceedings of the 28th Australasian Conference on Information Systems (ACIS 2017). p. 1-9 9 p.

    Research output: Book chapter/Published conference paperConference paper