default search action
Steven Furnell
Person information
- affiliation: University of Nottingham, UK
- affiliation (former): Plymouth University, Centre for Security, Communications and Network Research
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j127]Konstantinos Mersinas, Maria Bada, Steven Furnell:
Cybersecurity behavior change: A conceptualization of ethical principles for behavioral interventions. Comput. Secur. 148: 104025 (2025) - 2024
- [j126]Yuxiang Hong, Mengyi Xu, Steven Furnell:
Situational support and information security behavioural intention: a comparative study using conservation of resources theory. Behav. Inf. Technol. 43(3): 523-539 (2024) - [j125]Dimah Almani, Tim Muller, Xavier Carpent, Takahito Yoshizawa, Steven Furnell:
Enabling Vehicle-to-Vehicle Trust in Rural Areas: An Evaluation of a Pre-Signature Scheme for Infrastructure-Limited Environments. Future Internet 16(3): 77 (2024) - [j124]Wesam Fallatah, Joakim Kävrestad, Steven Furnell:
Establishing a Model for the User Acceptance of Cybersecurity Training. Future Internet 16(8): 294 (2024) - [j123]Abeer Almutairi, Xavier Carpent, Steven Furnell:
Recommendation-Based Trust Evaluation Model for the Internet of Underwater Things. Future Internet 16(9): 346 (2024) - [j122]Nathan L. Clarke, Steven Furnell:
Editorial: Human aspects of cyber security. Inf. Comput. Secur. 32(4): 405-406 (2024) - [j121]Joakim Kävrestad, Steven Furnell, Marcus Nohlberg:
User perception of Context-Based Micro-Training - a method for cybersecurity training. Inf. Secur. J. A Glob. Perspect. 33(2): 121-137 (2024) - [j120]Steven Furnell:
Usable Cybersecurity: a Contradiction in Terms? Interact. Comput. 36(1): 3-15 (2024) - [c134]Steven Furnell, Eliana Stavrou:
Assessing the Consistency of Cyber Security Education. EDUCON 2024: 1-5 - [c133]Steven Furnell:
Cyber Security for SMEs - Clear, Consistent and Complete? EICC 2024: 224 - [c132]Arwa Binsedeeq, Steven Furnell, Xavier Carpent, Nicholas Gervassis:
Seek and Locate? Examining the Accessibility of Cybersecurity Features. HCI (45) 2024: 30-42 - [c131]Cameron Gray, Steven Furnell:
Enhancing Cyber Hygiene and Literacy via Interactive Mini-games. HCI (45) 2024: 43-52 - [c130]Ezgi Tugcu, Steven Furnell:
Exploring User Understanding of Wireless Connectivity and Security on Smartphones. HCI (45) 2024: 116-125 - [c129]Samiah Alghamdi, Steven Furnell, Steven R. Bagley:
Towards a Harmonised Approach for Security and Privacy Management in Smart Home Contexts. HCI (45) 2024: 170-187 - [c128]Aseel Aldabjan, Steven Furnell, Xavier Carpent, Maria Papadaki:
Cybersecurity Incident Response Readiness in Organisations. ICISSP 2024: 262-269 - [c127]Steven Furnell, Xavier Carpent, Andrew Martin:
Assessing the Cross-Disciplinary Accessibility of CyBOK. World Conference on Information Security Education 2024: 165-179 - [c126]Abeer Almutairi, Xavier Carpent, Steven Furnell:
Towards a Mobility-Aware Trust Model for the Internet of Underwater Things. SEC 2024: 1-15 - [e51]Sokratis K. Katsikas, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Maria Ugarelli, Isabel Praça, Wenjuan Li, Weizhi Meng, Steven Furnell, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Michele Ianni, Mila Dalla Preda, Kim-Kwang Raymond Choo, Miguel Pupo Correia, Abhishta Abhishta, Giovanni Sileno, Mina Alishahi, Harsha K. Kalutarage, Naoto Yanai:
Computer Security. ESORICS 2023 International Workshops - CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part II. Lecture Notes in Computer Science 14399, Springer 2024, ISBN 978-3-031-54128-5 [contents] - [e50]Gabriele Lenzini, Paolo Mori, Steven Furnell:
Proceedings of the 10th International Conference on Information Systems Security and Privacy, ICISSP 2024, Rome, Italy, February 26-28, 2024. SCITEPRESS 2024, ISBN 978-989-758-683-5 [contents] - [e49]Nikolaos Pitropakis, Sokratis K. Katsikas, Steven Furnell, Konstantinos Markantonakis:
ICT Systems Security and Privacy Protection - 39th IFIP International Conference, SEC 2024, Edinburgh, UK, June 12-14, 2024, Proceedings. IFIP Advances in Information and Communication Technology 710, Springer 2024, ISBN 978-3-031-65174-8 [contents] - 2023
- [j119]Nathan L. Clarke, Steven Furnell:
Editorial: Human aspects of cyber security. Inf. Comput. Secur. 31(3): 265-266 (2023) - [j118]Adéle da Veiga, Steven Furnell, Yuxiang Hong, Merrill Warkentin:
Introduction to the special issue on insider threats in cybersecurity. J. Inf. Secur. Appl. 79: 103585 (2023) - [c125]Hamza Abdi, Steven R. Bagley, Steven Furnell, Jamie Twycross:
Automatically Labeling Cyber Threat Intelligence reports using Natural Language Processing. DocEng 2023: 23:1-23:4 - [c124]Joakim Kävrestad, Wesam Fallatah, Steven Furnell:
Cybersecurity Training Acceptance: A Literature Review. HAISA 2023: 53-63 - [c123]Fayez Alotaibi, Steven Furnell, Ying He:
Cyber Security Awareness and Education Support for Home and Hybrid Workers. HAISA 2023: 64-75 - [c122]Gregor Langner, Steven Furnell, Gerald Quirchmayr, Florian Skopik:
A Comprehensive Design Framework for Multi-disciplinary Cyber Security Education. HAISA 2023: 105-115 - [c121]Saud Alotaibi, Steven Furnell, Y. He:
Towards a Framework for the Personalization of Cybersecurity Awareness. HAISA 2023: 143-153 - [c120]Fai Ben Salamah, Marco A. Palomino, Maria Papadaki, Matthew J. Craven, Steven Furnell:
Evaluating the Risks of Human Factors Associated with Social Media Cybersecurity Threats. HAISA 2023: 349-363 - [c119]Wesam Fallatah, Steven Furnell, Ying He:
Refining the Understanding of Usable Security. HCI (35) 2023: 49-67 - [c118]Maria Bada, Steven Furnell, Jason R. C. Nurse, Jason Dymydiuk:
Supporting Small and Medium-Sized Enterprises in Using Privacy Enhancing Technologies. HCI (35) 2023: 274-289 - [c117]Nourah Alshomrani, Steven Furnell, Ying He:
Assessing User Understanding, Perception and Behaviour with Privacy and Permission Settings. HCI (35) 2023: 557-575 - [c116]Samiah Alghamdi, Steven Furnell:
Assessing Security and Privacy Insights for Smart Home Users. ICISSP 2023: 592-599 - [c115]Kaushik Krishnan Balaji, Dimah Almani, Steven Furnell:
Assessing the Impact of Attacks on Connected and Autonomous Vehicles in Vehicular Ad Hoc Networks. ICISSP 2023: 774-782 - [e48]Steven Furnell, Nathan L. Clarke:
Human Aspects of Information Security and Assurance - 17th IFIP WG 11.12 International Symposium, HAISA 2023, Kent, UK, July 4-6, 2023, Proceedings. IFIP Advances in Information and Communication Technology 674, Springer 2023, ISBN 978-3-031-38529-2 [contents] - [e47]Paolo Mori, Gabriele Lenzini, Steven Furnell:
Information Systems Security and Privacy - 7th International Conference, ICISSP 2021, Virtual Event, February 11-13, 2021, and 8th International Conference, ICISSP 2022, Virtual Event, February 9-11, 2022, Revised Selected Papers. Communications in Computer and Information Science 1851, Springer 2023, ISBN 978-3-031-37806-5 [contents] - [e46]Paolo Mori, Gabriele Lenzini, Steven Furnell:
Proceedings of the 9th International Conference on Information Systems Security and Privacy, ICISSP 2023, Lisbon, Portugal, February 22-24, 2023. SciTePress 2023, ISBN 978-989-758-624-8 [contents] - 2022
- [j117]Steven Furnell, Kirsi Helkala, Naomi Woods:
Accessible authentication: Assessing the applicability for users with disabilities. Comput. Secur. 113: 102561 (2022) - [j116]Steven Furnell:
Assessing website password practices - Unchanged after fifteen years? Comput. Secur. 120: 102790 (2022) - [j115]Joakim Kävrestad, Allex Hagberg, Marcus Nohlberg, Jana Rambusch, Robert Roos, Steven Furnell:
Evaluation of Contextual and Game-Based Training for Phishing Detection. Future Internet 14(4): 104 (2022) - [j114]Yuxiang Hong, Steven Furnell:
Motivating Information Security Policy Compliance: Insights from Perceived Organizational Formalization. J. Comput. Inf. Syst. 62(1): 19-28 (2022) - [j113]Max Smith-Creasey, Steven Furnell, Muttukrishnan Rajarajan:
Continuous authentication for IoT smart home environments. Netw. Secur. 2022(4) (2022) - [c114]Abeer Almutairi, Ying He, Steven Furnell:
A Multi-Level Trust Framework for the Internet of Underwater Things. CSR 2022: 370-375 - [c113]Fai Ben Salamah, Marco A. Palomino, Maria Papadaki, Steven Furnell:
The Importance of the Job Role in Social Media Cybersecurity Training. EuroS&P Workshops 2022: 454-462 - [c112]Jerry Andriessen, Steven Furnell, Gregor Langner, Carmela Luciano, Gerald Quirchmayr, Vittorio Scarano, Teemu Johannes Tokola:
COLTRANE - Towards a Methodology and Platform Supported Educational Basis for Cybersecurity Education. HAISA 2022: 66-76 - [c111]Shreya Gupta, Steven Furnell:
From Cybersecurity Hygiene to Cyber Well-Being. HCI (32) 2022: 124-134 - [c110]Flora Barber, Steven Furnell:
Evaluating Consumer Understanding and Awareness of Connected and Autonomous Vehicle Data Privacy. ICISSP (Revised Selected Papers) 2022: 48-71 - [c109]Gregor Langner, Florian Skopik, Steven Furnell, Gerald Quirchmayr:
A Tailored Model for Cyber Security Education Utilizing a Cyber Range. ICISSP 2022: 365-377 - [c108]Flora Barber, Steven Furnell:
Benchmarking Consumer Data and Privacy Knowledge in Connected and Autonomous Vehicles. ICISSP 2022: 426-434 - [c107]Steven Furnell, Gregor Langner, Teemu Tokola, Jerry Andriessen, Gerald Quirchmayr, Carmela Luciano:
Collaborative Cybersecurity Learning: Establishing Educator and Learner Expectations and Requirements. World Conference on Information Security Education 2022: 46-59 - [e45]Wenjuan Li, Steven Furnell, Weizhi Meng:
Attacks and Defenses for the Internet-of-Things - 5th International Workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13745, Springer 2022, ISBN 978-3-031-21310-6 [contents] - [e44]Sokratis K. Katsikas, Costas Lambrinoudakis, Nora Cuppens, John Mylopoulos, Christos Kalloniatis, Weizhi Meng, Steven Furnell, Frank Pallas, Jörg Pohle, M. Angela Sasse, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Jorge Maestre Vidal, Marco Antonio Sotelo Monge:
Computer Security. ESORICS 2021 International Workshops - CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE, Darmstadt, Germany, October 4-8, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13106, Springer 2022, ISBN 978-3-030-95483-3 [contents] - [e43]Nathan L. Clarke, Steven Furnell:
Human Aspects of Information Security and Assurance - 16th IFIP WG 11.12 International Symposium, HAISA 2022, Mytilene, Lesbos, Greece, July 6-8, 2022, Proceedings. IFIP Advances in Information and Communication Technology 658, Springer 2022, ISBN 978-3-031-12171-5 [contents] - [e42]Steven Furnell, Paolo Mori, Edgar R. Weippl, Olivier Camp:
Information Systems Security and Privacy - 6th International Conference, ICISSP 2020, Valletta, Malta, February 25-27, 2020, Revised Selected Papers. Communications in Computer and Information Science 1545, Springer 2022, ISBN 978-3-030-94899-3 [contents] - [e41]Paolo Mori, Gabriele Lenzini, Steven Furnell:
Proceedings of the 8th International Conference on Information Systems Security and Privacy, ICISSP 2022, Online Streaming, February 9-11, 2022. SCITEPRESS 2022, ISBN 978-989-758-553-1 [contents] - [e40]Sokratis K. Katsikas, Steven Furnell:
Trust, Privacy and Security in Digital Business - 19th International Conference, TrustBus 2022, Vienna, Austria, August 24, 2022, Proceedings. Lecture Notes in Computer Science 13582, Springer 2022, ISBN 978-3-031-17925-9 [contents] - 2021
- [j112]Faiz Zaki, Abdullah Gani, Hamid Tahaei, Steven Furnell, Nor Badrul Anuar:
Grano-GT: A granular ground truth collection tool for encrypted browser-based Internet traffic. Comput. Networks 184: 107617 (2021) - [j111]Steven Furnell:
The cybersecurity workforce and skills. Comput. Secur. 100: 102080 (2021) - [j110]Alaa Tolah, Steven M. Furnell, Maria Papadaki:
An empirical analysis of the information security culture key factors framework. Comput. Secur. 108: 102354 (2021) - [j109]Betsy Uchendu, Jason R. C. Nurse, Maria Bada, Steven Furnell:
Developing a cyber security culture: Current practices and future needs. Comput. Secur. 109: 102387 (2021) - [j108]Steven Furnell, Julie M. Haney, Mary Theofanos:
Pandemic Parallels: What Can Cybersecurity Learn From COVID-19? Computer 54(3): 68-72 (2021) - [j107]Fayez Ghazai Alotaibi, Nathan Luke Clarke, Steven M. Furnell:
A novel approach for improving information security management and awareness for home environments. Inf. Comput. Secur. 29(1): 25-48 (2021) - [j106]Ram Herkanaidu, Steven M. Furnell, Maria Papadaki:
Towards a cross-cultural education framework for online safety awareness. Inf. Comput. Secur. 29(4): 664-679 (2021) - [j105]Yuxiang Hong, Steven Furnell:
Understanding cybersecurity behavioral habits: Insights from situational support. J. Inf. Secur. Appl. 57: 102710 (2021) - [j104]Reinhardt A. Botha, Steven Furnell:
Facing up to security and privacy in online meetings. Netw. Secur. 2021(5): 7-13 (2021) - [j103]Wenjuan Li, Weizhi Meng, Steven Furnell:
Exploring touch-based behavioral authentication on smartphone email applications in IoT-enabled smart cities. Pattern Recognit. Lett. 144: 35-41 (2021) - [c106]Gregor Langner, Jerry Andriessen, Gerald Quirchmayr, Steven Furnell, Vittorio Scarano, Teemu Tokola:
Poster: The Need for a Collaborative Approach to Cyber Security Education. EuroS&P 2021: 719-721 - [c105]Steven Furnell, Kirsi Helkala, Naomi Woods:
Disadvantaged by Disability: Examining the Accessibility of Cyber Security. HCI (7) 2021: 197-212 - [c104]Joakim Kävrestad, Steven Furnell, Marcus Nohlberg:
What Parts of Usable Security Are Most Important to Users? World Conference on Information Security Education 2021: 126-139 - [p4]Steven Furnell, Paul S. Haskell-Dowland, Manish Agrawal, Richard L. Baskerville, Anirban Basu, Matt Bishop, Jorge Cuéllar, Sara Foresti, Lynn Futcher, Nurit Gal-Oz, Tejaswini (Teju) Herath, Christian Damsgaard Jensen, Allen C. Johnston, Wouter Joosen, Giovanni Livraga, Javier López, Stephen Marsh, Fabio Martinelli, Fabio Massacci, Aljosa Pasic, Stef Schinagl, Abbas Shahim, Kerry-Lynn Thomson, Jaideep Vaidya, Tony Vance, Merrill Warkentin:
Information Security and Privacy - Challenges and Outlook. IFIP's Exciting First 60+ Years 2021: 383-401 - [e39]Steven Furnell, Nathan L. Clarke:
Human Aspects of Information Security and Assurance - 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7-9, 2021, Proceedings. IFIP Advances in Information and Communication Technology 613, Springer 2021, ISBN 978-3-030-81110-5 [contents] - [e38]Paolo Mori, Gabriele Lenzini, Steven Furnell:
Proceedings of the 7th International Conference on Information Systems Security and Privacy, ICISSP 2021, Online Streaming, February 11-13, 2021. SCITEPRESS 2021, ISBN 978-989-758-491-6 [contents] - [i2]Betsy Uchendu, Jason R. C. Nurse, Maria Bada, Steven Furnell:
Developing a cyber security culture: Current practices and future needs. CoRR abs/2106.14701 (2021) - 2020
- [j102]Karl van der Schyff, Stephen Flowerday, Steven Furnell:
Duplicitous social media and data surveillance: An evaluation of privacy risk. Comput. Secur. 94: 101822 (2020) - [j101]Karl van der Schyff, Stephen Flowerday, Steven Furnell:
Privacy risk and the use of Facebook Apps: A gender-focused vulnerability assessment. Comput. Secur. 96: 101866 (2020) - [j100]Adéle da Veiga, Ruthea Vorster, Fudong Li, Nathan L. Clarke, Steven M. Furnell:
Comparing the protection and use of online personal information in South Africa and the United Kingdom in line with data protection requirements. Inf. Comput. Secur. 28(3): 399-422 (2020) - [c103]Nirosha Holton, Steven Furnell:
Assessing the provision of public-facing cybersecurity guidance for end-users. CIC 2020: 161-168 - [c102]Ram Herkanaidu, Steven M. Furnell, Maria Papadaki:
Towards a Cross-Cultural Education Framework for Online Safety Awareness. HAISA 2020: 47-57 - [c101]Steven Furnell, Matt Bishop:
Education for the Multifaith Community of Cybersecurity. WISE 2020: 32-45 - [e37]Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie I. Antón, Stefanos Gritzalis, Frank Pallas, Jörg Pohle, M. Angela Sasse, Weizhi Meng, Steven Furnell, Joaquín García-Alfaro:
Computer Security - ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27, 2019 Revised Selected Papers. Lecture Notes in Computer Science 11980, Springer 2020, ISBN 978-3-030-42047-5 [contents] - [e36]Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie I. Antón, Stefanos Gritzalis, Weizhi Meng, Steven Furnell:
Computer Security - ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14-18, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12501, Springer 2020, ISBN 978-3-030-64329-4 [contents] - [e35]Nathan L. Clarke, Steven Furnell:
Human Aspects of Information Security and Assurance - 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8-10, 2020, Proceedings. IFIP Advances in Information and Communication Technology 593, Springer 2020, ISBN 978-3-030-57403-1 [contents] - [e34]Paolo Mori, Steven Furnell, Olivier Camp:
Information Systems Security and Privacy - 5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers. Communications in Computer and Information Science 1221, Springer 2020, ISBN 978-3-030-49442-1 [contents] - [e33]Steven Furnell, Paolo Mori, Edgar R. Weippl, Olivier Camp:
Proceedings of the 6th International Conference on Information Systems Security and Privacy, ICISSP 2020, Valletta, Malta, February 25-27, 2020. SCITEPRESS 2020, ISBN 978-989-758-399-5 [contents]
2010 – 2019
- 2019
- [j99]Ali Ismail Awad, Steven Furnell, Abbas M. Hassan, Theo Tryfonas:
Special issue on security of IoT-enabled infrastructures in smart cities. Ad Hoc Networks 92 (2019) - [j98]Nader Sohrabi Safa, Carsten Maple, Steven Furnell, Muhammad Ajmal Azad, Charith Perera, Mohammad Dabbagh, Mehdi Sookhak:
Deterrence and prevention-based model to mitigate information security insider threats in organisations. Future Gener. Comput. Syst. 97: 587-597 (2019) - [j97]Tri Hoang Vo, Woldemar F. Fuhrmann, Klaus Peter Fischer-Hellmann, Steven Furnell:
Identity-as-a-Service: An Adaptive Security Infrastructure and Privacy-Preserving User Identity for the Cloud Environment. Future Internet 11(5): 116 (2019) - [j96]Mutlaq Jalimid Alotaibi, Steven Furnell, Nathan L. Clarke:
A framework for reporting and dealing with end-user security policy compliance. Inf. Comput. Secur. 27(1): 2-25 (2019) - [j95]Hiep Cong Pham, Linda Brennan, Steven Furnell:
Information security burnout: Identification of sources and mitigating factors from security demands and resources. J. Inf. Secur. Appl. 46: 96-107 (2019) - [c100]Manal Alohali, Nathan L. Clarke, Steven Furnell:
Information Security Risk Communication: A User-Centric Approach. AICCSA 2019: 1-10 - [c99]Abdulaziz Altamimi, Nathan L. Clarke, Steven Furnell, Fudong Li:
Multi-Platform Authorship Verification. CECC 2019: 13:1-13:7 - [c98]Tri Hoang Vo, Woldemar F. Fuhrmann, Klaus Peter Fischer-Hellmann, Steven Furnell:
Automated Trust Negotiation for Cloud Applications in Identity-as-a-Service. CommNet 2019: 1-8 - [c97]Yuxiang Hong, Steven Furnell:
Organizational formalization and employee information security behavioral intentions based on an extended TPB model. Cyber Security 2019: 1-4 - [c96]Fayez Alotaibi, Nathan Luke Clarke, Steven Furnell:
Holistic Information Security Management for Home Environments. HAISA 2019: 20-33 - [c95]Steven Furnell, Faisal Alotaibi, Rawan Esmael:
Aligning Security Practice with Policy: Guiding and Nudging towards Better Behavior. HICSS 2019: 1-10 - [c94]Saud Alotaibi, Abdulrahman Alruban, Steven Furnell, Nathan L. Clarke:
A Novel Behaviour Profiling Approach to Continuous Authentication for Mobile Applications. ICISSP 2019: 246-251 - [c93]Alaa Tolah, Steven M. Furnell, Maria Papadaki:
A Comprehensive Framework for Understanding Security Culture in Organizations. World Conference on Information Security Education 2019: 143-156 - [c92]Tri Hoang Vo, Woldemar F. Fuhrmann, Klaus Peter Fischer-Hellmann, Steven Furnell:
Efficient Privacy-preserving User Identity with Purpose-based Encryption. ISNCC 2019: 1-8 - [e32]Steven Furnell, Nathan L. Clarke:
Thirteenth International Symposium on Human Aspects of Information Security & Assurance, HAISA 2019, Nicosia, Cyprus, July 15-16, 2019, Proceedings. University of Plymouth 2019, ISBN 978-0244-19096-5 [contents] - [e31]Paolo Mori, Steven Furnell, Olivier Camp:
Information Systems Security and Privacy - 4th International Conference, ICISSP 2018, Funchal, Madeira, Portugal, January 22-24, 2018, Revised Selected Papers. Communications in Computer and Information Science 977, Springer 2019, ISBN 978-3-030-25108-6 [contents] - [e30]Paolo Mori, Steven Furnell, Olivier Camp:
Proceedings of the 5th International Conference on Information Systems Security and Privacy, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019. SciTePress 2019, ISBN 978-989-758-359-9 [contents] - [e29]Weizhi Meng, Steven Furnell:
Security and Privacy in Social Networks and Big Data - 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers. Communications in Computer and Information Science 1095, Springer 2019, ISBN 978-981-15-0757-1 [contents] - [i1]Nader Sohrabi Safa, Carsten Maple, Steven M. Furnell, Muhammad Ajmal Azad, Charith Perera, Mohammad Dabbagh, Mehdi Sookhak:
Deterrence and Prevention-based Model to Mitigate Information Security Insider Threats in Organisations. CoRR abs/1903.12079 (2019) - 2018
- [j94]Steven Furnell, Warut Khern-am-nuai, Rawan Esmael, Weining Yang, Ninghui Li:
Enhancing security behaviour by supporting the user. Comput. Secur. 75: 1-9 (2018) - [j93]Hiba Al-Kawaz, Nathan L. Clarke, Steven Furnell, Fudong Li:
Facial-Forensic Analysis Tool. Digit. Investig. 26 Supplement: S136 (2018) - [j92]Nader Sohrabi Safa, Carsten Maple, Tim Watson, Steven Furnell:
Information security collaboration formation in organisations. IET Inf. Secur. 12(3): 238-245 (2018) - [j91]Steven Furnell, Nathan L. Clarke:
Guest editorial. Inf. Comput. Secur. 26(3): 262-263 (2018) - [j90]Manal Alohali, Nathan L. Clarke, Fudong Li, Steven Furnell:
Identifying and predicting the factors affecting end-users' risk-taking behavior. Inf. Comput. Secur. 26(3): 306-326 (2018) - [j89]Saud Alotaibi, Steven Furnell, Nathan L. Clarke:
A novel transparent user authentication approach for mobile applications. Inf. Secur. J. A Glob. Perspect. 27(5-6): 292-305 (2018) - [j88]Weizhi Meng, Kim-Kwang Raymond Choo, Steven Furnell, Athanasios V. Vasilakos, Christian W. Probst:
Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks. IEEE Trans. Netw. Serv. Manag. 15(2): 761-773 (2018) - [c91]Ram Herkanaidu, Steven Furnell, Maria Papadaki, Tharabun Khuchinda:
Designing an Anti-Cyberbullying Programme in Thailand. HAISA 2018: 111-122 - [c90]Ismini Vasileiou, Steven Furnell:
Personalising Security Education: Factors Influencing Individual Awareness and Compliance. ICISSP (Revised Selected Papers) 2018: 189-200 - [c89]Ismini Vasileiou, Steven Furnell:
Enhancing Security Education - Recognising Threshold Concepts and Other Influencing Factors. ICISSP 2018: 398-403 - [c88]Steven Furnell, Michael K, Fred Piper, Chris E, Catherine H, Chris Ensor:
A National Certification Programme for Academic Degrees in Cyber Security. World Conference on Information Security Education 2018: 133-145 - [c87]Abdulrahman Alruban, Nathan L. Clarke, Fudong Li, Steven Furnell:
Biometrically Linking Document Leakage to the Individuals Responsible. TrustBus 2018: 135-149 - [e28]Nathan L. Clarke, Steven Furnell:
Twelfth International Symposium on Human Aspects of Information Security & Assurance, HAISA 2018, Dundee, Scotland, UK, August 29-31, 2018, Proceedings. University of Plymouth 2018, ISBN 978-0-244-40254-9 [contents] - [e27]Paolo Mori, Steven Furnell, Olivier Camp:
Information Systems Security and Privacy - Third International Conference, ICISSP 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers. Communications in Computer and Information Science 867, Springer 2018, ISBN 978-3-319-93353-5 [contents] - [e26]Paolo Mori, Steven Furnell, Olivier Camp:
Proceedings of the 4th International Conference on Information Systems Security and Privacy, ICISSP 2018, Funchal, Madeira - Portugal, January 22-24, 2018. SciTePress 2018, ISBN 978-989-758-282-0 [contents] - [e25]Steven Furnell, Haralambos Mouratidis, Günther Pernul:
Trust, Privacy and Security in Digital Business - 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5-6, 2018, Proceedings. Lecture Notes in Computer Science 11033, Springer 2018, ISBN 978-3-319-98384-4 [contents] - 2017
- [j87]Ali Feizollah, Nor Badrul Anuar, Rosli Salleh, Guillermo Suarez-Tangil, Steven Furnell:
AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection. Comput. Secur. 65: 121-134 (2017) - [j86]Nathan L. Clarke, Fudong Li, Steven Furnell:
A novel privacy preserving user identification approach for network traffic. Comput. Secur. 70: 335-350 (2017) - [j85]Steven Furnell, Ismini Vasileiou:
Security education and awareness: just let them burn? Netw. Secur. 2017(12): 5-9 (2017) - [c86]Abdulrahman Alruban, Nathan L. Clarke, Fudong Li, Steven Furnell:
Insider Misuse Attribution using Biometrics. ARES 2017: 42:1-42:7 - [c85]Alaa Tolah, Steven Furnell, Maria Papadaki:
A comperhansive framework for cultivating and assessing Information Security Culture . HAISA 2017: 52-64 - [c84]Manal Alohali, Nathan L. Clarke, Fudong Li, Steven Furnell:
Identifying the Factors Affecting End-Users’ Risk-Taking Behavior. HAISA 2017: 126-144 - [c83]Nathan L. Clarke, Fudong Li, Abdulrahman Alruban, Steven Furnell:
Insider Misuse Identification using Transparent Biometrics. HICSS 2017: 1-10 - [c82]Steven Furnell:
Keynote speaker 5: Taming security technology. ICITST 2017: 19 - [c81]Fayez Alotaibi, Nathan L. Clarke, Steven Furnell:
An analysis of home user security awareness & education. ICITST 2017: 116-122 - [c80]Faisal Alotaibi, Steven Furnell, Ingo Stengel, Maria Papadaki:
Enhancing cyber security awareness with mobile games. ICITST 2017: 129-134 - [c79]Shahlaa Mashhadani, Hiba Al-Kawaz, Nathan L. Clarke, Steven Furnell, Fudong Li:
A novel multimedia-forensic analysis tool (M-FAT). ICITST 2017: 388-395 - [c78]Daniela Pacella, Elena Dell'Aquila, Davide Marocco, Steven Furnell:
Toward an Automatic Classification of Negotiation Styles Using Natural Language Processing. IVA 2017: 339-342 - [e24]Steven Furnell, Nathan L. Clarke:
Eleventh International Symposium on Human Aspects of Information Security & Assurance, HAISA 2017, Adelaide, Australia, November 28-30, 2017, Proceedings. University of Plymouth 2017, ISBN 978-1-84102-428-8 [contents] - [e23]Olivier Camp, Steven Furnell, Paolo Mori:
Information Systems Security and Privacy - Second International Conference, ICISSP 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers. Communications in Computer and Information Science 691, Springer 2017, ISBN 978-3-319-54432-8 [contents] - [e22]Paolo Mori, Steven Furnell, Olivier Camp:
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, ICISSP 2017, Porto, Portugal, February 19-21, 2017. SciTePress 2017, ISBN 978-989-758-209-7 [contents] - 2016
- [j84]Saad Alqahtany, Nathan L. Clarke, Steven Furnell, Christoph Reich:
A forensic acquisition and analysis system for IaaS. Clust. Comput. 19(1): 439-453 (2016) - [j83]Abdulwahid Al Abdulwahid, Nathan L. Clarke, Ingo Stengel, Steven Furnell, Christoph Reich:
Continuous and transparent multimodal authentication: reviewing the state of the art. Clust. Comput. 19(1): 455-474 (2016) - [j82]Nader Sohrabi Safa, Rossouw von Solms, Steven Furnell:
Information security policy compliance model in organizations. Comput. Secur. 56: 70-82 (2016) - [j81]M. Al Fahdi, Nathan L. Clarke, Fudong Li, Steven M. Furnell:
A suspect-oriented intelligent and automated computer forensic analysis. Digit. Investig. 18: 65-76 (2016) - [j80]Abdulrahman Alruban, Nathan L. Clarke, Fudong Li, Steven Furnell:
Leveraging Biometrics for Insider Misuse Identification. Int. J. Cyber Situational Aware. 1(1): 130-151 (2016) - [j79]Nathan Luke Clarke, Jane Symes, Hataichanok Saevanee, Steven M. Furnell:
Awareness of Mobile Device Security: A Survey of User's Attitudes. Int. J. Mob. Comput. Multim. Commun. 7(1): 15-31 (2016) - [j78]Steven Furnell, Nathan Luke Clarke:
Guest editorial. Inf. Comput. Secur. 24(2): 138 (2016) - [j77]Hussain Alsaiari, Maria Papadaki, Paul Dowland, Steven Furnell:
Graphical One-Time Password (GOTPass): A usability evaluation. Inf. Secur. J. A Glob. Perspect. 25(1-3): 94-108 (2016) - [j76]Steven Furnell:
Vulnerability management: not a patch on where we should be? Netw. Secur. 2016(4): 5-9 (2016) - [c77]Saad Alqahtany, Nathan L. Clarke, Steven Furnell, Christoph Reich:
A Forensic Acquisition and Analysis System for IaaS: Architectural Model and Experiment. ARES 2016: 345-354 - [c76]Abdulrahman Alruban, Nathan L. Clarke, Fudong Li, Steven Furnell:
Proactive biometric-enabled forensic imprinting. Cyber Security And Protection Of Digital Services 2016: 1-15 - [c75]Steven Furnell, Charles A. Shoniregun:
Welcome message. ICITST 2016: 3 - [c74]Faisal Alotaibi, Steven Furnell, Ingo Stengel, Maria Papadaki:
A survey of cyber-security awareness in Saudi Arabia. ICITST 2016: 154-158 - [c73]Gaseb Alotibi, Nathan L. Clarke, Fudong Li, Steven Furnell:
User profiling from network traffic via novel application-level interactions. ICITST 2016: 279-285 - [c72]Mutlaq Jalimid Alotaibi, Steven Furnell, Nathan L. Clarke:
Information security policies: A review of challenges and influencing factors. ICITST 2016: 352-358 - [e21]Nathan L. Clarke, Steven Furnell:
Tenth International Symposium on Human Aspects of Information Security & Assurance, HAISA 2016, Frankfurt, Germany, July 19-21, 2016, Proceedings. University of Plymouth 2016, ISBN 978-1-84102-413-4 [contents] - [e20]Olivier Camp, Steven Furnell, Paolo Mori:
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, ICISSP 2016, Rome, Italy, February 19-21, 2016. SciTePress 2016, ISBN 978-989-758-167-0 [contents] - [e19]Sokratis K. Katsikas, Costas Lambrinoudakis, Steven Furnell:
Trust, Privacy and Security in Digital Business - 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings. Lecture Notes in Computer Science 9830, Springer 2016, ISBN 978-3-319-44340-9 [contents] - 2015
- [j75]Nader Sohrabi Safa, Mehdi Sookhak, Rossouw von Solms, Steven Furnell, Norjihan Binti Abdul Ghani, Tutut Herawan:
Information security conscious care behaviour formation in organizations. Comput. Secur. 53: 65-78 (2015) - [j74]Hataichanok Saevanee, Nathan L. Clarke, Steven Furnell, Valerio Biscione:
Continuous user authentication using multi-modal biometrics. Comput. Secur. 53: 234-246 (2015) - [j73]Weizhi Meng, Duncan S. Wong, Steven Furnell, Jianying Zhou:
Surveying the Development of Biometric User Authentication on Mobile Phones. IEEE Commun. Surv. Tutorials 17(3): 1268-1293 (2015) - [j72]Steven Furnell:
Editorial. Inf. Comput. Secur. 23(1) (2015) - [j71]Hussain Alsaiari, Maria Papadaki, Paul Dowland, Steven Furnell:
Secure Graphical One Time Password (GOTPass): An Empirical Study. Inf. Secur. J. A Glob. Perspect. 24(4-6): 207-220 (2015) - [j70]Moussa Ouedraogo, Severine Mignon, Hervé Cholez, Steven Furnell, Eric Dubois:
Security transparency: the next frontier for security research in the cloud. J. Cloud Comput. 4: 12 (2015) - [j69]Adnan Akhunzada, Mehdi Sookhak, Nor Badrul Anuar, Abdullah Gani, Ejaz Ahmed, Muhammad Shiraz, Steven Furnell, Amir Hayat, Muhammad Khurram Khan:
Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions. J. Netw. Comput. Appl. 48: 44-57 (2015) - [j68]Noor Hayani Abd Rahim, Suraya Hamid, Miss Laiha Mat Kiah, Shahaboddin Shamshirband, Steven Furnell:
A systematic review of approaches to assessing cybersecurity awareness. Kybernetes 44(4): 606-622 (2015) - [c71]Emad Sherif, Steven Furnell, Nathan L. Clarke:
An Identification of Variables Influencing the Establishment of Information Security Culture. HCI (22) 2015: 436-448 - [c70]Steven M. Furnell:
From Passwords to Biometrics: In Pursuit of a Panacea. ICISSP (Revised Selected Papers) 2015: 3-15 - [c69]Steven Furnell:
From Passwords to Biometrics - In Pursuit of a Panacea. ICISSP 2015: IS-7 - [c68]Emad Sherif, Steven Furnell, Nathan L. Clarke:
Awareness, behaviour and culture: The ABC in cultivating security compliance. ICITST 2015: 90-94 - [c67]Saud Alotaibi, Steven Furnell, Nathan L. Clarke:
Transparent authentication systems for mobile device security: A review. ICITST 2015: 406-413 - [c66]Abdulwahid Al Abdulwahid, Nathan L. Clarke, Ingo Stengel, Steven Furnell, Christoph Reich:
Security, Privacy and Usability - A Survey of Users' Perceptions and Attitudes. TrustBus 2015: 153-168 - [e18]Steven Furnell, Nathan L. Clarke:
Ninth International Symposium on Human Aspects of Information Security & Assurance, HAISA 2015 ,Lesvos, Greece, July 1-3, 2015, Proceedings. University of Plymouth 2015, ISBN 978-1-84102-388-5 [contents] - 2014
- [j67]Eugene Kaspersky, Steven Furnell:
A security education Q&A. Inf. Manag. Comput. Secur. 22(2): 130-133 (2014) - [j66]Mohd Zalisham Jali, Steven M. Furnell, Paul Dowland:
Investigating the Viability of Multifactor Graphical Passwords for User Authentication. Inf. Secur. J. A Glob. Perspect. 23(1-2): 10-21 (2014) - [j65]Nor Badrul Anuar, Maria Papadaki, Steven Furnell, Nathan L. Clarke:
A response selection model for intrusion response systems: Response Strategy Model (RSM). Secur. Commun. Networks 7(11): 1831-1848 (2014) - [c65]Hussain Alsaiari, Maria Papadaki, Paul Dowland, Steven Furnell:
Alternative Graphical Authentication for Online Banking Environments. HAISA 2014: 122-136 - [c64]Hataichanok Saevanee, Nathan L. Clarke, Steven Furnell, Valerio Biscione:
Text-Based Active Authentication for Mobile Devices. SEC 2014: 99-112 - [c63]Fudong Li, Nathan L. Clarke, Steven Furnell, Is-Haka Mkwawa:
Performance evaluation of a Technology Independent Security Gateway for Next Generation Networks. WiMob 2014: 281-286 - [e17]Nathan L. Clarke, Steven Furnell:
Eighth International Symposium on Human Aspects of Information Security & Assurance, HAISA 2014 ,Plymouth, UK, July 8-9, 2014. Proceedings. University of Plymouth 2014, ISBN 978-1-84102-375-5 [contents] - [e16]Paul Dowland, Steven Furnell, Bogdan V. Ghita:
Tenth International Network Conference, INC 2014, Plymouth, UK, July 8-10, 2014. Proceedings. Plymouth University 2014, ISBN 978-1-84102-373-1 [contents] - 2013
- [j64]Chris G. Hocking, Steven M. Furnell, Nathan L. Clarke, Paul L. Reynolds:
Co-operative user identity verification using an Authentication Aura. Comput. Secur. 39: 486-502 (2013) - [j63]Herbert J. Mattord, Yair Levy, Steven Furnell:
An Expert Panel Approach on Developing a Unified System Authentication Benchmarking Index. Int. J. Interdiscip. Telecommun. Netw. 5(2): 32-42 (2013) - [j62]Muttukrishnan Rajarajan, Steven Furnell:
Editorial for Security and Privacy in Wireless Networks Special Issue. Mob. Networks Appl. 18(5): 664-665 (2013) - [j61]Nor Badrul Anuar, Maria Papadaki, Steven Furnell, Nathan L. Clarke:
Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM). Secur. Commun. Networks 6(9): 1087-1116 (2013) - [c62]Herbert J. Mattord, Yair Levy, Steven Furnell:
Factors of Password-based Authentication. AMCIS 2013 - [c61]Steven Furnell, Nina Bär:
Essential Lessons Still Not Learned? Examining the Password Practices of End-Users and Service Providers. HCI (27) 2013: 217-225 - [c60]Steven M. Furnell:
Security Education: The Challenge beyond the Classroom. World Conference on Information Security Education 2013: 32-38 - [c59]M. Al Fahdi, Nathan L. Clarke, Steven M. Furnell:
Challenges to digital forensics: A survey of researchers & practitioners attitudes and opinions. ISSA 2013: 1-8 - [c58]Fudong Li, Nathan L. Clarke, Steven Furnell:
A Technology Independent Security Gateway for Real-Time Multimedia Communication. NSS 2013: 14-25 - [c57]Bernhard Heinzle, Steven Furnell:
Assessing the Feasibility of Security Metrics. TrustBus 2013: 149-160 - [e15]Steven Furnell, Nathan L. Clarke, Vasilios Katos:
European Information Security Multi-Conference (EISMC 2013), Lisbon, Portugal, May 8-10, 2013. Proceedings. Plymouth University 2013, ISBN 978-1-84102-345-8 [contents] - [e14]Steven Furnell, Costas Lambrinoudakis, Javier López:
Trust, Privacy, and Security in Digital Business - 10th International Conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013. Proceedings. Lecture Notes in Computer Science 8058, Springer 2013, ISBN 978-3-642-40342-2 [contents] - 2012
- [j60]Steven Furnell, Nathan L. Clarke:
Power to the people? The evolving recognition of human aspects of security. Comput. Secur. 31(8): 983-988 (2012) - [c56]Mike Krey, Steven Furnell, Bettina Harriehausen, Matthias Knoll:
Approach to the Evaluation of a Method for the Adoption of Information Technology Governance, Risk Management and Compliance in the Swiss Hospital Environment. HICSS 2012: 2810-2819 - [c55]George Magklaras, Steven Furnell:
The Insider Threat Prediction and Specification Language. INC 2012: 51-61 - [c54]Hataichanok Saevanee, Nathan L. Clarke, Steven M. Furnell:
Multi-modal Behavioural Biometric Authentication for Mobile Devices. SEC 2012: 465-474 - [c53]Nor Badrul Anuar, Maria Papadaki, Steven Furnell, Nathan L. Clarke:
A Response Strategy Model for Intrusion Response Systems. SEC 2012: 573-578 - [c52]Nathan L. Clarke, Vasilios Katos, Sofia-Anna Menesidou, Bogdan V. Ghita, Steven Furnell:
A Novel Security Architecture for a Space-Data DTN. WWIC 2012: 342-349 - [e13]Nathan L. Clarke, Steven Furnell:
6th International Symposium on Human Aspects of Information Security and Assurance, HAISA 2012, Crete, Greece, June 6-8, 2012. Proceedings. University of Plymouth 2012, ISBN 978-1-84102-317-5 [contents] - [e12]Reinhardt A. Botha, Paul Dowland, Steven Furnell:
Ninth International Network Conference (INC 2012), Port Elizabeth, South Africa, July 11-12, 2012. Proceedings. University of Plymouth 2012, ISBN 978-1-84102-315-1 [contents] - [e11]Dimitris Gritzalis, Steven Furnell, Marianthi Theoharidou:
Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings. IFIP Advances in Information and Communication Technology 376, Springer 2012, ISBN 978-3-642-30435-4 [contents] - 2011
- [j59]George Magklaras, Steven Furnell, Maria Papadaki:
LUARM: An Audit Engine for Insider Misuse Detection. Int. J. Digit. Crime Forensics 3(3): 37-49 (2011) - [j58]Steven Furnell, Rossouw von Solms, Andy D. Phippen:
Preventative Actions for Enhancing Online Protection and Privacy. Int. J. Inf. Technol. Syst. Approach 4(2): 1-11 (2011) - [j57]Shuhaili Talib, Nathan L. Clarke, Steven Furnell:
Establishing A Personalized Information Security Culture. Int. J. Mob. Comput. Multim. Commun. 3(1): 63-79 (2011) - [c51]Mohd Zalisham Jali, Steven Furnell, Paul Dowland:
Multifactor graphical passwords: An assessment of end-user performance. IAS 2011: 7-12 - [c50]Zarul Fitri Zaaba, Steven Furnell, Paul Dowland:
End-User Perception and Usability of Information Security. HAISA 2011: 97-107 - [c49]Hataichanok Saevanee, Nathan L. Clarke, Steven Furnell:
SMS linguistic profiling authentication on mobile device. NSS 2011: 224-228 - [c48]Mohd Zalisham Jali, Steven Furnell, Paul Dowland:
Quantifying the Effect of Graphical Password Guidelines for Better Security. SEC 2011: 80-91 - [c47]George Magklaras, Steven Furnell, Maria Papadaki:
LUARM – An audit engine for insider misuse detection. WDFIA 2011: 133-148 - [e10]Steven Furnell, Nathan L. Clarke:
5th International Symposium on Human Aspects of Information Security and Assurance, HAISA 2011, London, UK, July 7-8, 2011. Proceedings. University of Plymouth 2011, ISBN 978-1-84102-284-0 [contents] - [e9]Steven Furnell, Costas Lambrinoudakis, Günther Pernul:
Trust, Privacy and Security in Digital Business - 8th International Conference, TrustBus 2011, Toulouse, France, August 29 - September 2, 2011. Proceedings. Lecture Notes in Computer Science 6863, Springer 2011, ISBN 978-3-642-22889-6 [contents] - 2010
- [j56]Gina C. Tjhai, Steven Furnell, Maria Papadaki, Nathan L. Clarke:
A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm. Comput. Secur. 29(6): 712-723 (2010) - [j55]Mohd Zalisham Jali, Steven Furnell, Paul Dowland:
Assessing image-based authentication techniques in a web-based environment. Inf. Manag. Comput. Secur. 18(1): 43-53 (2010) - [j54]Steven M. Furnell:
Online identity: Giving it all away? Inf. Secur. Tech. Rep. 15(2): 42-46 (2010) - [j53]Benjamin George Sanders, Paul Dowland, Shirley Atkinson, Daniel Zahra, Steven Furnell, Maria Papadaki:
Online Addiction: A Cultural Comparison of Privacy Risks in Online Gaming Environments. J. Multim. Process. Technol. 1(3): 181-193 (2010) - [j52]Steven Furnell:
Mac security: An Apple that can't be bitten? Netw. Secur. 2010(1): 7-11 (2010) - [j51]Maria Papadaki, Steven Furnell:
Vulnerability management: an attitude of mind? Netw. Secur. 2010(10): 4-8 (2010) - [j50]Steven Furnell:
Usability versus complexity - striking the balance in end-user security. Netw. Secur. 2010(12): 13-17 (2010) - [c46]Shuhaili Talib, Nathan L. Clarke, Steven Furnell:
An Analysis of Information Security Awareness within Home and Work Environments. ARES 2010: 196-203 - [c45]Chris G. Hocking, Steven M. Furnell, Nathan L. Clarke, Paul L. Reynolds:
A distributed and cooperative user authentication framework. IAS 2010: 304-310 - [c44]Benjamin George Sanders, Paul Dowland, Steven Furnell:
Implications and Risks of MMORPG Addiction: Motivations, Emotional Investment, Problematic Usage and Personal Privacy. SAISMC 2010: 61-73 - [c43]Felix Rimbach, Udo Bleimann, Steven Furnell:
Psycho-Analytical Considerations in Internet Marketing - Focusing on Human Needs And Personal Trust. INC 2010: 345-354 - [c42]Nor Badrul Anuar, Maria Papadaki, Steven Furnell, Nathan L. Clarke:
An investigation and survey of response options for Intrusion Response Systems (IRSs). ISSA 2010 - [c41]Benjamin George Sanders, Vivian Chen, Daniel Zahra, Paul Dowland, Shirley Atkinson, Maria Papadaki, Steven Furnell:
Online addiction: privacy risks in online gaming environments. MEDES 2010: 114-121 - [c40]Tarik Ibrahim, Steven Furnell, Maria Papadaki, Nathan L. Clarke:
Assessing the Usability of End-User Security Software. TrustBus 2010: 177-189 - [c39]Mike Krey, Bettina Harriehausen, Matthias Knoll, Steven Furnell:
IT Governance and Its Impact on the Swiss Healthcare. UKSim 2010: 340-345 - [p3]George Magklaras, Steven Furnell:
Insider Threat Specification as a Threat Mitigation Technique. Insider Threats in Cyber Security 2010: 219-244 - [e8]Nathan L. Clarke, Steven Furnell, Rossouw von Solms:
South African Information Security Multi-Conference, SAISMC 2010, Port Elizabeth, South Africa, May 17-18, 2010. Proceedings. University of Plymouth 2010, ISBN 978-1-84102-256-7 [contents] - [e7]Udo Bleimann, Paul Dowland, Steven Furnell, Oliver Schneider:
Eighth International Network Conference (INC 2010), Heidelberg, Germany, July 6-8, 2010. Proceedings. University of Plymouth 2010, ISBN 978-1-84102-259-8 [contents]
2000 – 2009
- 2009
- [j49]Reinhardt A. Botha, Steven Furnell, Nathan L. Clarke:
From desktop to mobile: Examining the security experience. Comput. Secur. 28(3-4): 130-137 (2009) - [j48]Dimitris Gritzalis, Steven Furnell:
Editorial. Comput. Secur. 28(7): 491-492 (2009) - [j47]Taimur Bakhshi, Maria Papadaki, Steven Furnell:
Social engineering: assessing vulnerabilities in practice. Inf. Manag. Comput. Secur. 17(1): 53-63 (2009) - [j46]Steven M. Furnell:
The irreversible march of technology. Inf. Secur. Tech. Rep. 14(4): 176-180 (2009) - [j45]Simone Fischer-Hübner, Steven Furnell, Costas Lambrinoudakis:
Exploring Trust, Security and Privacy in Digital Business. Trans. Large Scale Data Knowl. Centered Syst. 1: 191-210 (2009) - [c38]Benjamin George Sanders, Paul Dowland, Steven Furnell:
An Assessment of People's Vulnerabilities in Relation to Personal & Sensitive Data. HAISA 2009: 50-60 - [c37]Shirley Atkinson, Steven Furnell, Andrew D. Phippen:
Risk Culture Influences in Internet Safety and Security. HAISA 2009: 61-70 - [c36]Mohd Zalisham Jali, Steven Furnell, Paul Dowland:
Evaluating Web-Based User Authentication using Graphical Techniques. HAISA 2009: 108-118 - [c35]Aaron Smith, Maria Papadaki, Steven M. Furnell:
Improving Awareness of Social Engineering Attacks. World Conference on Information Security Education 2009: 249-256 - [c34]Nathan L. Clarke, Sevasti Karatzouni, Steven Furnell:
Flexible and Transparent User Authentication for Mobile Devices. SEC 2009: 1-12 - [e6]Steven Furnell, Nathan L. Clarke:
3rd International Conference on Human Aspects of Information Security and Assurance, HAISA 2009, Athens, Greece, June 25-26, 2009. Proceedings. University of Plymouth 2009, ISBN 978-1-84102-231-4 [contents] - 2008
- [j44]Shukor Abd Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke:
Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks. Ad Hoc Networks 6(7): 1151-1167 (2008) - [j43]Steven Furnell, Valleria Tsaganidi, Andrew D. Phippen:
Security beliefs and barriers for novice Internet users. Comput. Secur. 27(7-8): 235-240 (2008) - [c33]Taimur Bakhshi, Maria Papadaki, Steven Furnell:
A Practical Assessment of Social Engineering Vulnerabilities. HAISA 2008: 12-23 - [c32]Gina C. Tjhai, Maria Papadaki, Steven Furnell, Nathan L. Clarke:
Investigating the problem of IDS false alarms: An experimental study using Snort. SEC 2008: 253-267 - [c31]Gina C. Tjhai, Maria Papadaki, Steven Furnell, Nathan L. Clarke:
The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset. TrustBus 2008: 139-150 - [e5]Nathan L. Clarke, Steven Furnell:
2nd International Conference on Human Aspects of Information Security and Assurance, HAISA 2008, Plymouth, UK, July 8-9, 2008. Proceedings. University of Plymouth 2008, ISBN 978-1-84102-189-8 [contents] - [e4]Paul Dowland, Steven Furnell:
Seventh International Network Conference (INC 2008), Plymouth, UK, July 8-10, 2008. Proceedings. University of Plymouth 2008, ISBN 978-1-84102-188-1 [contents] - [e3]Steven Furnell, Sokratis K. Katsikas, Antonio Lioy:
Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings. Lecture Notes in Computer Science 5185, Springer 2008, ISBN 978-3-540-85734-1 [contents] - 2007
- [j42]Steven Furnell:
IFIP workshop - Information security culture. Comput. Secur. 26(1): 35 (2007) - [j41]Nathan L. Clarke, Steven Furnell:
Advanced user authentication for mobile devices. Comput. Secur. 26(2): 109-119 (2007) - [j40]Steven Furnell, P. Bryant, Andrew D. Phippen:
Assessing the security perceptions of personal Internet users. Comput. Secur. 26(5): 410-417 (2007) - [j39]Steven Furnell:
Making security usable: Are things improving? Comput. Secur. 26(6): 434-443 (2007) - [j38]Steven Furnell:
An assessment of website password practices. Comput. Secur. 26(7-8): 445-451 (2007) - [j37]Philip M. Rodwell, Steven Furnell, Paul L. Reynolds:
A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head. Comput. Secur. 26(7-8): 468-478 (2007) - [j36]Simone Fischer-Hübner, Steven Furnell, Costas Lambrinoudakis:
Special issue: TrustBus 2006. Comput. Syst. Sci. Eng. 22(5) (2007) - [j35]Nathan L. Clarke, Steven Furnell:
Authenticating mobile phone users using keystroke analysis. Int. J. Inf. Sec. 6(1): 1-14 (2007) - [j34]Klaus Peter Fischer, Udo Bleimann, Woldemar F. Fuhrmann, Steven Furnell:
Analysis of security-relevant semantics of BPEL in cross-domain defined business processes. Inf. Manag. Comput. Secur. 15(2): 116-127 (2007) - [j33]C. J. Tucker, Steven Furnell, Bogdan V. Ghita, Phillip J. Brooke:
A new taxonomy for comparing intrusion detection systems. Internet Res. 17(1): 88-98 (2007) - [j32]Jörg Preuß, Steven Furnell, Maria Papadaki:
Considering the potential of criminal profiling to combat hacking. J. Comput. Virol. 3(2): 135-141 (2007) - [c30]Shukor Abd Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke:
Building a Trusted Community for Mobile Ad Hoc Networks Using Friend Recommendation. ADHOC-NOW 2007: 129-141 - [c29]Klaus Peter Fischer, Udo Bleimann, Woldemar F. Fuhrmann, Steven Furnell:
Security Policy Enforcement in BPEL-Defined Collaborative Business Processes. ICDE Workshops 2007: 685-694 - [c28]Steven Furnell, Dimitris Katsabas, Paul Dowland, Fraser Reid:
A Practical Usability Evaluation of Security Features in End-User Applications. SEC 2007: 205-216 - [c27]Klaus Peter Fischer, Udo Bleimann, Steven Furnell:
Pre-execution Security Policy Assessment of Remotely Defined BPEL-Based Grid Processes. TrustBus 2007: 178-189 - 2006
- [j31]Steven Furnell, Adila Jusoh, Dimitris Katsabas:
The challenges of understanding and using security: A survey of end-users. Comput. Secur. 25(1): 27-35 (2006) - [j30]Hazel Lacohée, Andrew D. Phippen, Steven Furnell:
Risk and restitution: Assessing how users establish online trust. Comput. Secur. 25(7): 486-493 (2006) - [j29]Maria Papadaki, Steven Furnell:
Achieving automated intrusion response: a prototype implementation. Inf. Manag. Comput. Secur. 14(3): 235-251 (2006) - [j28]George Magklaras, Steven Furnell, Phillip J. Brooke:
Towards an insider threat prediction specification language. Inf. Manag. Comput. Secur. 14(4): 361-381 (2006) - [c26]Shukor Abd Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke:
A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks - A Friend Approach. ISI 2006: 590-595 - [c25]Steven Furnell, Adila Jusoh, Dimitris Katsabas, Paul Dowland:
Considering the Usability of End-User Security Software. SEC 2006: 307-316 - [e2]Paul Dowland, Steven Furnell, Bhavani Thuraisingham, Xiaoyang Sean Wang:
Security Management, Integrity, and Internal Control in Information Systems - IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference [18-19 November 2004, Fairfax, Virginia; USA]. IFIP 193, Springer 2006, ISBN 978-0-387-29826-9 [contents] - [e1]Simone Fischer-Hübner, Steven Furnell, Costas Lambrinoudakis:
Trust and Privacy in Digital Business, Third International Conference, TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings. Lecture Notes in Computer Science 4083, Springer 2006, ISBN 3-540-37750-6 [contents] - 2005
- [b2]Steven Furnell:
Computer insecurity - risking the system. Springer 2005, ISBN 978-1-85233-943-2, pp. I-XIII, 1-240 - [j27]Steven Furnell:
Why users cannot use security. Comput. Secur. 24(4): 274-279 (2005) - [j26]George Magklaras, Steven Furnell:
A preliminary model of end user sophistication for insider threat prediction in IT systems. Comput. Secur. 24(5): 371-380 (2005) - [j25]Nathan L. Clarke, Steven Furnell:
Authentication of users on mobile telephones - A survey of attitudes and practices. Comput. Secur. 24(7): 519-527 (2005) - [j24]A. Al-Ayed, Steven Furnell, D. Zhao, Paul Dowland:
An automated framework for managing security vulnerabilities. Inf. Manag. Comput. Security 13(2): 156-166 (2005) - [j23]Maria Papadaki, Steven M. Furnell:
Informing the decision process in an automated intrusion response system. Inf. Secur. Tech. Rep. 10(3): 150-161 (2005) - [c24]Shukor Abd Razak, Steven Furnell, Phillip J. Brooke:
A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks. ECIW 2005: 271-280 - 2004
- [j22]Steven Furnell, I. Papadopoulos, Paul Dowland:
A long-term trial of alternative user authentication technologies. Inf. Manag. Comput. Secur. 12(2): 178-190 (2004) - [j21]Andrew D. Phippen, L. Sheppard, Steven Furnell:
A practical evaluation of Web analytics. Internet Res. 14(4): 284-293 (2004) - [j20]Steffen W. Schilke, Udo Bleimann, Steven Furnell, Andrew D. Phippen:
Multi-dimensional-personalisation for location and interest-based recommendation. Internet Res. 14(5): 379-385 (2004) - [c23]Vassilis Dimopoulos, Steven Furnell, Murray E. Jennex, Ioannis Kritharas:
Approaches to IT Security in Small and Medium Enterprises. AISM 2004: 73-82 - [c22]Aung Htike Phyo, Steven Furnell, Francisco Portilla:
A Framework For Role-based Monitoring of Insider Misuse. International Information Security Workshops 2004: 51-66 - [c21]Frank Land, Helga Drummond, Philip Vos Fellman, Roberto Rodriguez, Steven Furnell, Prodromos Tsiavos:
The Darker Side of Innovation. IT Innovation for Adaptability and Competitiveness 2004: 465-466 - [c20]Paul Dowland, Steven Furnell:
A Long-term Trial of Keystroke Profiling using Digraph, Trigraph and Keyword Latencies. SEC 2004: 275-290 - [c19]Vassilis Dimopoulos, Steven Furnell:
A Protection Profiles Approach to Risk Analysis for Small and Medium Enterprises. IICIS 2004: 267-283 - 2003
- [j19]Steven Furnell, Aung Htike Phyo:
Considering the Problem of Insider IT Misuse. Australas. J. Inf. Syst. 10(2) (2003) - [j18]Nathan L. Clarke, Steven Furnell, Benn Lines, Paul L. Reynolds:
Keystroke dynamics on a mobile handset: a feasibility study. Inf. Manag. Comput. Secur. 11(4): 161-166 (2003) - [c18]Maria Papadaki, Steven Furnell, Benn Lines, Paul L. Reynolds:
Operational Characteristics of an Automated Intrusion Response System. Communications and Multimedia Security 2003: 65-75 - [c17]Steven Furnell:
Cybercrime: Vandalizing the Information Society. ICWE 2003: 8-16 - [c16]Steven Furnell, Alastair G. Warren, Paul Dowland:
Improving Security Awareness Through Computer-based Training. World Conference on Information Security Education 2003: 287-301 - [c15]Nathan L. Clarke, Steven Furnell, Benn Lines, Paul L. Reynolds:
Using Keystroke Analysis as a Mechanism for Subscriber Authentication on Mobile Handsets. SEC 2003: 97-108 - 2002
- [j17]George Magklaras, Steven Furnell:
Insider Threat Prediction Tool: Evaluating the probability of IT misuse. Comput. Secur. 21(1): 62-73 (2002) - [j16]Nathan L. Clarke, Steven Furnell, Philip M. Rodwell, Paul L. Reynolds:
Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices. Comput. Secur. 21(3): 220-228 (2002) - [j15]I. Irakleous, Steven Furnell, Paul Dowland, Maria Papadaki:
An experimental comparison of secret-based user authentication technologies. Inf. Manag. Comput. Secur. 10(3): 100-108 (2002) - [j14]Chukwuma U. Ngini, Steven Furnell, Bogdan V. Ghita:
Assessing the global accessibility of the Internet. Internet Res. 12(4): 329-338 (2002) - [c14]A. Alayed, Steven Furnell, I. M. Barlow:
Addressing Internet Security Vulnerabilities: A Benchmarking Study. SEC 2002: 121-132 - [c13]Paul Dowland, Steven Furnell, Maria Papadaki:
Keystroke Analysis as a Method of Advanced User Authentication and Response. SEC 2002: 215-226 - [c12]Michael P. Evans, Steven Furnell:
A web-based resource migration protocol using WebDAV. WWW 2002: 263-271 - 2001
- [j13]Michael P. Evans, Steven Furnell:
The Resource Locator Service: fixing a flaw in the web. Comput. Networks 37(3/4): 307-330 (2001) - [j12]Steven Furnell, Pelagia Chiliarchaki, Paul Dowland:
Security analysers: administrator assistants or hacker helpers? Inf. Manag. Comput. Secur. 9(2): 93-101 (2001) - [j11]Bogdan V. Ghita, Steven Furnell, Benn Lines, D. Le-Foll, Emmanuel C. Ifeachor:
Network quality of service monitoring for IP telephony. Internet Res. 11(1): 26-34 (2001) - [c11]Steven Furnell, Maria Papadaki, George Magklaras, A. Alayed:
Security Vulnerabilities and System Intrusions - The Need for Automatic Response Frameworks. Conference on Information Security Management & Small Systems Security 2001: 87-98 - [c10]Harjit Singh, Steven Furnell, Benn Lines, Paul Dowland:
Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining. MMM-ACNS 2001: 153-158 - 2000
- [j10]Steven Furnell, Paul Dowland, H. M. Illingworth, Paul L. Reynolds:
Authentication and Supervision: A Survey of User Attitudes. Comput. Secur. 19(6): 529-539 (2000) - [j9]Steven Furnell, Paul Dowland:
A conceptual architecture for real-time intrusion monitoring. Inf. Manag. Comput. Secur. 8(2): 65-75 (2000) - [j8]Michael P. Evans, Steven Furnell:
Internet-based security incidents and the potential for false alarms. Internet Res. 10(3): 238-245 (2000)
1990 – 1999
- 1999
- [j7]Steven Furnell, Matthew J. Warren:
Computer hacking and cyber terrorism: the real threats in the new millennium? Comput. Secur. 18(1): 28-34 (1999) - [j6]Paul Dowland, Steven Furnell, H. M. Illingworth, Paul L. Reynolds:
Computer crime and abuse: A survey of public attitudes and awareness. Comput. Secur. 18(8): 715-726 (1999) - [j5]Steven Furnell, Paul Dowland, Peter W. Sanders:
Dissecting the "Hacker Manifesto". Inf. Manag. Comput. Secur. 7(2): 69-75 (1999) - [j4]Michael P. Evans, Andrew D. Phippen, G. Mueller, Steven Furnell, Peter W. Sanders, Paul L. Reynolds:
Strategies for content migration on the World Wide Web. Internet Res. 9(1): 25-34 (1999) - [j3]Steven M. Furnell, T. Karweni:
Security implications of electronic commerce: a survey of consumers and businesses. Internet Res. 9(5): 372-382 (1999) - 1998
- [j2]Steven Furnell, P. D. Onions, Martin Knahl, Peter W. Sanders, Udo Bleimann, U. Gojny, H. F. Röder:
A security framework for online distance learning and training. Internet Res. 8(3): 236-242 (1998) - [c9]Andy D. Phippen, Chris Hindle, Steven Furnell:
A Software Platform for the Integration of a Mobile Client to Intranet Services. EUROMEDIA 1998: 177-183 - [c8]Steven Furnell, Dimitris Gritzalis, Sokratis K. Katsikas, Konstantinos Mavroudakis, Peter W. Sanders, Matthew J. Warren:
Methods of Responding to Healthcare Security Incidents. MedInfo 1998: 1138-1142 - 1997
- [j1]Steven M. Furnell, Matthew J. Warren:
Computer abuse: vandalizing the information society. Internet Res. 7(1): 61-66 (1997) - [c7]Michael P. Evans, Kimmo T. Kettunen, Grahame K. Blackwell, Steven Furnell, Andrew D. Phippen, Stephen Hope, Paul L. Reynolds:
Network Resource Adaptation in the DOLMEN Service Machine. IS&N 1997: 25-34 - [c6]Matthew J. Warren, Steven Furnell, Peter W. Sanders:
ODESSA - a new approach to healthcare risk analysis. SEC 1997: 391-402 - 1996
- [c5]Steven Furnell, Nichola Jane Salmons, Peter W. Sanders, Colin T. Stockel, Matthew J. Warren:
Approaches to Security in Healthcare Multimedia Systems. Communications and Multimedia Security 1996: 25-36 - [c4]Steven M. Furnell, Mark Green, Stephen Hope, Joseph P. Morrissey, Paul L. Reynolds:
Non-Intrusive Security Arrangements to Support Terminal and Personal Mobility. EUROMEDIA 1996: 167-171 - [c3]Elizabeth M. Joyce, Steven M. Furnell, Paul L. Reynolds, Peter W. Sanders:
Addressing Security in an Integrated Service Engineering Environment. EUROMEDIA 1996: 172-179 - [c2]Steven Furnell, D. A. Hill, I. Rosewall, Matthew J. Warren:
A Telematics Security Training Application. EUROMEDIA 1996: 286-290 - [c1]Steven Furnell, Joseph P. Morrissey, Peter W. Sanders, Colin T. Stockel:
Applications of keystroke analysis for improved login security and continuous user authentication. SEC 1996: 283-294 - [p2]Peter W. Sanders, Steven Furnell, Matthew J. Warren:
Baseline Security Guidelines for Health Care Management. Data Security for Health Care (1) 1996: 82-107 - [p1]Steven M. Furnell, Peter W. Sanders:
The SEISMED Guidelines for Host Systems Security. Towards Security in Medical Telematics 1996: 150-155 - 1995
- [b1]Steven Marcus Furnell:
Data security in European healthcare information systems. University of Plymouth, UK, 1995
Coauthor Index
aka: Nathan Luke Clarke
aka: Paul S. Haskell-Dowland
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint