Professor Steve Furnell
Profiles

Professor Steve Furnell

Associate Dean for International and Postgraduate

Faculty of Science and Engineering

Role

Associate Dean (International and Postgraduate), Faculty of Science and Engineering
Professor of Information Security
Leader of the Centre for Security, Communications & Network Research
Adjunct Professor, Edith Cowan University, Perth, Western Australia
Honorary Professor, Nelson Mandela Metropolitan University, South Africa

Qualifications

Chartered Information Technology Professional (CITP)

Chartered Engineer (CEng)

SEDA Accredited Teacher of Higher Education, University of Plymouth

PhD in information systems security, University of Plymouth

Professional membership

Fellow, British Computer Society
Senior Member, Institute of Electrical and Electronic Engineers
Fellow, Institute of Information Security Professionals (F.Inst.ISP)
Member, Association of Computing Machinery
Principal Fellow, Higher Education Academy

Roles on external bodies

Societies and international groups

  • UK national representative, Technical Committee 11 (Security and Privacy Protection in Information Processing Systems), International Federation for Information Processing (IFIP)
  • Board Member, Institute for Information Security Professionals
  • Chair, Institute for Information Security Professionals, South West Branch
  • Chair, IFIP Technical Committee 11 - Security and Privacy Protection in Information Processing Systems
  • Member, IFIP TC 11, Working Group 11.1 - Information Security Management
  • Member, IFIP TC 11, Working Group 11.8 - Information Security Education
  • Member, IFIF TC 11, Working Group 11.12 - Human Aspects of Information Security and Assurance

Editorships and Refereeing for Journals

  • Editor-in-Chief, Information and Computer Security
  • Associate Editor, Computers & Security
  • Associate Editor, The Computer Journal
  • Associate Editor, Journal of Information Systems Security
  • Co-Editor, Journal of Information Warfare
  • Editorial Board, EAI Transactions on Security and Safety
  • Editorial Board, International Journal on Advances in Security
  • Editorial Board, International Journal for Information Security Research
  • Editorial Board, Future Internet
  • Editorial Advisory Board, Internet Research
  • Editorial Advisory Board, International Journal of Information and Learning Technology
Other 
  • 2002-17, Chair, British Computer Society South West Branch
  • 2014-16, Member, Costs of Cyber Crime Working Group, UK Home Office.
  • 2013-15, Working Group Member, Dimension Three (Building Cyber Skills and Leadership) and Dimension Five (Controlling Risks Through Technology and Processes), Global Cyber Security Capacity Centre, Oxford Martin School, University of Oxford.

Teaching interests

Undergraduate

  • SEC101 Introduction to Computer Security
  • SEC102PP Cybersecurity Essentials*
  • SEC202 Secure Systems Architectures and Mechanisms
  • SEC301 Information Security Management and Governance*

Postgraduate

  • NET505 Computer Networks and Cybersecurity
  • SEC501 Information Security Management and Governance*

* denotes module leadership

Course development activity:

  • Co-Architect of BSc (Hons) Computer & Information Security (2007)
  • Architect of the MSc/MRes Information Systems Security (2003-04)
  • Co-Architect of the MSc/MRes Network Systems Engineering (2002-03)

Staff serving as external examiners

2017
  • Security Modeling of Web Applications in Wireless Local Area Networks through Bio-Cryptography, PhD thesis, National Institute of Technology Jamshedpur, India.
  • A Framework for Fostering Cyber Security Culture at a Social Level, PhD thesis, Nelson Mandela Metropolitan University, South Africa.
  • Exploiting the self-similarity of inter-packet timings to detect and investigate network attacks and identify abnormalities, EngD thesis, University of Reading, UK.
  • Towards a Smartphone Application User Security Competency Evolution Model, PhD Thesis, University of Johannesburg, South Africa.
  • APIC: A Method for Automated Pattern Identification and Classification, PhD Thesis, University of Cape Town, South Africa.
  • Illegitimate Traffic Detection in Encrypted Tunnel using Ensemble Classification Technique, PhD thesis, Universiti Putra Malaysia, Malaysia.
  • Digital Forensics Practices: A Road Map for Building Digital Forensics Capability, PhD thesis, De Montfort University, UK.
  • Improving the Security of Real World Identity Management Systems, PhD thesis, Royal Holloway University of London, UK.
2016
  • Encouraging Employee Compliance with Information Security Policies in Cloud Computing in Hong Kong, Doctor of Business Administration thesis, University of Newcastle, Australia.
  • Passive video forgery detection using Frame correlation statistical features, Doctoral thesis, University of Malaya, Malaysia
  • Security Demands, Organisational and Personal Resources: A Stress-Based Security Compliance Model, PhD thesis, RMIT University, Australia.
  • A Hierarchical Group Key Management with Host Mobility Protocol in Wireless Mobile Environments, Doctoral thesis, University of Malaya, Malaysia.
  • A Critical Analysis of End-User Security Behaviour, PhD thesis, University of South Wales, UK. 
2015
  • The development and evaluation of an InformationSecurity Awareness Capability Model: Linking ISO/IEC 27002 controls withAwareness Importance, Capability and Risk, PhD thesis, University of Southern Queensland, Australia.
  • MobiLeak: Security and Privacy of Personal Data inMobile Applications. PhD thesis, RoyalInstitute of Technology, Sweden.
  • A Biometric Security System Using Dorsal Hand Vein Patterns and Palmprints, PhD thesis, University of Mauritius, Mauritius.
  • Multi Provision Service based Internet charging Scheme, PhD thesis, University of Technology Sydney, Australia.
  • Exploring the Memorability of Multiple Recognition-Based Graphical Passwords and Their Resistance to Guessability Attacks, PhD thesis, University of Glasgow, UK.
2014
  • Information security risk management in Australian real estate sectors, PhD thesis, University of South Australia, Australia.
  • A Model to improved Smartphone Information Security Awareness, PhD thesis, University of Fort Hare, South Africa
  • A Noun-Based Approach to Support Location and Recency of Developers’ Activities for Improving Automatic Bug Assignment, PhD thesis, University of Malaya, Malaysia.
  • A Secure and Scalable Communication Framework for Inter-Cloud Services, PhD thesis, City University, UK.
  • On Methodologies to Select Systems for Automated Personal Identification, PhD thesis, Royal Holloway University of London, UK.
  • Secure Management of Multi-Application Mobile Platforms, PhD thesis, KTH Royal Institute of Technology, Sweden (assessed as Quality Reviewer, post-examination)
  • A Value Framework for Information and Communication Technology in South African Higher Education Institutions, PhD thesis, Nelson Mandela Metropolitan University, South Africa.
  • Energy-Efficient Data Security Schemes for Mobile Users in Cloud Environment, PhD thesis, University of Malaya, Malaysia.
2013
  • Trusted Channels and Roots of Trust in Distributed Embedded Systems, PhD thesis, Macquarie University, Australia.
  • An Exploration of the Factors Influencing Home Users’ Cybersecurity Behaviours, PhD thesis, Victoria University of Wellington, New Zealand.
  • Risk Analysis Using “Conflicting Incentives” as an Alternative Notion of Risk, PhD thesis, Gjovik University College, Norway.
  • An Ecologically Valid Evaluation of an Observation-Resilient Graphical Authentication Mechanism, PhD thesis, University of Glasgow, UK.
  • Investigating Information Systems Security Management Maturity for Small Medium Industries and Enterprises Electronic Commerce Using Technology, Organization and Enterprise Framework, PhD thesis, University of Malaya, Malaysia.
  • A method for analysing Value–Based Compliance in Information Systems Security, PhD thesis, Orebro University, Sweden.
  • Adaptable Middleware Framework for Interactive Services in Pervasive Computing, PhD thesis, Anna University, India.
  • Effective Online Privacy Mechanisms with Persuasive Communication, PhD thesis, Cranfield University, UK.
2012
  • A Baseline for Information Security Knowledge for End Users, MTech thesis, Nelson Mandela Metropolitan University, South Africa.
  • A Code of Conduct for Computer Forensic Investigators, Professional Doctorate, University of East London, UK.
  • An Examination of Information System Risk Perception Using the Repertory Grid Technique, PhD Thesis, University of Adelaide, Australia.
  • Security Awareness in Western Australian Online Banking Users of Phishing Attacks, Professional Doctorate, Edith Cowan University, Australia.
  • A Method for Securing Online Community Service: A Study of Selected Western Australian Councils, Professional Doctorate, Edith Cowan University, Australia.
  • A Framework for the development of a Personal Information Security Agent. MTech thesis, Nelson Mandela Metropolitan University, South Africa.
2011
  • Valuation and Reporting ofSecurity Assurance at Operational Systems Level, PhD thesis, University of East London, UK.
  • A Scalable, Distributed andSecure Position-based Routing Protocol for Ad-Hoc Networks, PhD thesis,University of Malaya, Malaysia.
  • Towards an InformationSecurity Framework for Government to Government: A Perspective from East Africa,PhD thesis, University of South Africa, South Africa.
  • Educating users aboutinformation security by means of game play, MTech thesis, Nelson MandelaMetropolitan University, South Africa.
  • A Model for Privacy-AwarePresence Management in Mobile Communications, PhD thesis, Nelson MandelaMetropolitan University, South Africa.
  • A Tactical Management Modelof Forensic Evidence Processes, PhD thesis, University of Western Australia.
2010
  • Analysis Avoidance Techniques of Malicious Software, PhD thesis, Edith Cowan University, Australia
  • Securing Home & Correspondent Registrations in Mobile IPv6 Networks, PhD thesis, University of Manchester, UK
  • Authentication in Health Services, PhD thesis, University of Oslo, Norway.
2009
  • Vulnerabilities in Class One Electronic Product Code Radio Frequency Identification Systems, PhD thesis, Edith Cowan University, Australia.
  • A Framework for Assessing Certification Schemes for IT Security Professionals, PhD thesis, Deakin University, Australia.
  • Network Firewalls Dynamic Performance Evaluation and Formalisation, PhD thesis, Napier University, UK.
  • E-Business Information Systems Security Design Paradigm and Model, Royal Holloway University of London, UK.
2008
  • Authentication and Privacy in Mobile Web Services, PhD thesis, City University, UK.
  • Enhancing Password based authentication by incorporating typing dynamics, MPhil to PhD transfer, University of Mauritius, Mauritius.
  • Cultivating and Assessing Information Security Culture, PhD thesis, University of Pretoria, South Africa.
  • A Systems Analysis Method for Online Teaching and Learning Systems, PhD thesis, Deakin University, Australia.
  • Assessing the Risk to Information Systems and Processes from Malicious Electromagnetic Threats – Through the Development of Diagnostic and Detection Techniques, PhD thesis, University of Glamorgan, UK.
  • Optimization in Multi-Agent Systems, PhD thesis, Cork Institute of Technology, Ireland.
  • Safeguarding Australia from Cyber-terrorism: A Proposed Cyber-terrorism SCADA Risk Framework for Australia, PhD Thesis, Monash University, Australia.

2007

  • On the Identification of Security Vulnerabilities, PhD thesis, Royal Holloway University of London, UK.
  • An investigation into information security in general medical practice, PhD thesis, Edith Cowan University, Australia.
  • An Approach Towards Standardising Vulnerability Categories, MSc by research, University of Pretoria, South Africa.
  • Usable Security Policies in Runtime Environments. PhD thesis, Linköping University, Sweden.
  • Masquerader Detection in Mobile Context based on Behaviour and Environment Monitoring. PhD thesis, University of Jyvaskyla, Finland.

2006

  • An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer Networks. PhD thesis, University of Surrey, UK.
  • Program Behaviour Modelling with Flexible Logical Entity Abstraction, PhD thesis, University of Ballarat, Australia.
  • Multi-Party Non-Repudiation Protocols and Applications, PhD thesis, University of Malaga, Spain.
  • Digital Forensic Evidence Collection by System Activity Logs, PhD thesis. University of Melbourne, Australia.
  • Towards a Framework for Corporate Information Governance, MTech dissertation, Nelson Mandela Metropolitan University, South Africa.

2005

  • Delegating Signing Power to Mobile Agents: Algorithm and Protocol Designs. PhD thesis. University of Manchester, UK.
  • The Australian Small to Medium Enterprise E-Business Security Methodology. PhD thesis. Deakin University, Australia
  • Changing the Way the World Thinks about Computer Security. PhD by publication. Middlesex University, London, UK.
  • An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer Networks. MPhil to PhD transfer, University of Surrey, UK.
  • A Simulation Study of Traffic Conditioner Performance. MSc by research. University of Pretoria, South Africa. 
  • Holistic Information Security Management Framework. Doctoral Thesis. Karlstad University, Sweden.
  • Intrusion Detection and Protection of Application Servers. Licentiate thesis. Chalmers University, Sweden.

2004

  • Secure and Distributed Multicast Address Allocation on IPv6 Networks. MSc by research. University of Pretoria, South Africa.
  • A Tool-kit for XML-based and process-oriented Application Integration. PhD thesis. Cork Institute of Technology, Ireland
  • Threats to Information Systems and Effective Countermeasures. PhD by publication. University of Glamorgan, UK
  • DiDDeM: A system for early detection of denial-of-service attacks. PhD thesis. Liverpool John Moores University, UK.
  • Protecting agents against malicious host attack. PhD thesis. Aston University, UK.
  • Comprehensive strategy on security of electronic networks. MPhil thesis. University of Bradford, UK.
  • Secure and Distributed Multicast Address Allocation on IPv6 Networks. Masters thesis. University of Pretoria, South Africa
  • A Tool-kit for XML-based and process-oriented Application Integration. PhD thesis. Cork Institute of Technology, Ireland
  • Threats to Information Systems and Effective Countermeasures. PhD by publication. University of Glamorgan, UK
  • DiDDeM: A system for early detection of denial-of-service attacks. PhD thesis. Liverpool John Moores University, UK.
  • Protecting agents against malicious host attack. PhD thesis. Aston University, UK.
  • Comprehensive strategy on security of electronic networks. MPhil thesis. University of Bradford, UK.
  • NeGPAIM: A model for the proactive detection of information security intrusions. PhD thesis. Port Elizabeth Technikon (South Africa)

2003

  • Inferential analysis of incomplete audit data sets. PhD thesis. University of Glamorgan, UK.
  • Interactive Generation of Uniformly Random Samples of World Wide Web Pages. MSc by Research thesis. Kingston University, UK.
  • Enterprise IT Security Data Model and security of the Internet. MPhil thesis. Coventry University, UK.

2002

  • Distributed Failure Restoration for ATM Tactical Communication Networks. Ph.D. thesis. De Montfort University, UK.
  • An Anomaly Intrusion Detection System Based on Intelligent User Recognition. Ph.D. thesis. University of Jyvaskyla, Finland.
  • The evolving nature of fraud investigation and prevention. Ph.D. thesis. Deakin University, Australia.

2001

  • Design and Implementation of an Intranet-Solution especially with Workflow Aspects. M.Sc. research thesis. Cork Institute of Technology, Ireland.

2000

  • Methods for Intelligent User Recognition Based on Machine Learning Techniques in Anomaly Intrusion Detection. Licentiate thesis. University of Jyvaskyla, Finland.
  • Human-Computer Interaction via Telephone. M.Sc. research thesis. Cork Institute of Technology, Ireland.
  • Software Component Reuse by Adaptation. Ph.D. thesis. Cork Institute of Technology, Ireland.

 

Research interests

  • Cyber Security / IT Security, including user authentication, biometrics, cyber crime, intrusion detection and response, security management and culture, usable security
  • Internet Technologies and Applications
  • Mobility

Research degrees awarded to supervised students

As Director of Studies 

2015    Authentication Aura: A cooperative and distributed approach to user authentication on mobile devices

2015    Establishment of information security awareness and culture

2013    The perspective of usability and perception in information security

2013    The aggressive detection of network intrusions

2012    Multi-Dimensional Personalisation for the online and offline world

2012    Enhancing Automated Intrusion Response Systems

2011    AnInsider Misuse Threat Detection and Prediction Language

2011    Behavioural profiling in mobile networks 

2011    A Study of Graphical Alternatives for User Authentication

2010    Improving Intrusion Prevention, Detection and Response

2008    Profiling methods for computer crime and abuse*

2007    A Generic Architecture for Insider Misuse Monitoring in IT Systems

2007    Two-Tier Intrusion Detection System for Mobile Ad hoc Networks

2007    Effective information assurance with risk management

2006    Active security vulnerability identification and resolution

2006    Non-Intrusive Subscriber Authentication for Next Generation Mobile Communication Systems

2004    A generic architecture for intrusion specification & misuse detection in IT systems*

2004    Classifying and responding to network intrusions

2004    Enhancing subscriber security for mobile phones using biometrics

2004    User authentication and supervision in networked systems

2001    A model for managing information flow on the World Wide Web

2000    Flexible, composite multimedia medical record system for healthcare establishments

As Supervisor

2016    Automated Digital Forensics and Computer Crime Profiling

2016    Opportunities and Risks in Online Gaming Environments

2016    Graphical One-Time-Password Authentication

2014    Sustainability Reporting Process Model using Business Intelligence

2014    IT Governance in the Health Care Sector

2014    Non-Intrusive Continuous User Authentication for Mobile Devices

2014    Continuous User Authentication Using Multi-Modal Biometrics

2012    A Holistic Approach to Information Security Culture

2011    Anomaly-BasedCorrelation of IDS Alarms

2010    Internet Marketing for Profit Organisations: A Framework for the implementation of Strategic Internet Marketing

2007    SecurityPolicy Enforcement in Application Environments using Distributed Script-based Control Structures

2007    The social and psychological impact of SMS text messaging

2007    Dynamic Adaptation of Streamed Real-Time E-Learning Videos over the Internet

2004    Integrated multimedia communications for IP networks

2004    Performance characterisation of IP networks

2003    A Correlation Framework for Continuous User Authentication Using Data Mining

2002    A Generic Network and System Management Framework

2002    Security in a Distributed Processing Environment

2001    Component architectures and their impact upon software development

 

As of December 2017:

  • 100 refereed journal papers
  • 64 other journal papers
  • 193 refereed conference papers
  • 46 authored/edited books
  • 20 book chapters
  • 51 other published outputs.

For full details, please see the publication list on my research centre website. 

Publications from 2014 onwards are listed below.

Refereed papers in journals

  1. P.Korovessis, S.Furnell, M.Papadaki and P.Haskell-Dowland. 2017. “A toolkit approach to information security awareness and education", to appear in Journal of Cybersecurity Education, Research and Practice.
  2. N.L.Clarke, F.Li and S.M.Furnell. 2017. “A novel privacy preserving user identification approach for network traffic”, Computers & Security, vol. 70, pp335-350.
  3. A.Feizollaha, N.B.Anuar, R.Salleh, G.Suarez-Tangil and S.Furnell. 2017. “AndroDialysis:Analysis of Android Intent Effectiveness in Malware Detection”, Computers & Security, vol. 65, March2017, pp121-134.
  4. M.Al Fahdi, N.L.Clarke, F.Li and S.M.Furnell. 2016. “A Suspect-Oriented Intelligent and AutomatedComputer Forensic Analysis”, DigitalInvestigation, 18, pp65-76.
  5. T.Alotaibi and S.Furnell.2016. “Assessing Staff Acceptance andCompliance with Information Security”, InternationalJournal of Computing Academic Research (IJCAR), vol. 5, no.4, pp195-201.
  6. S.Alotaibi, S.Furnell,and N.Clarke. 2016. “A Novel Taxonomy for Mobile Applications Data”, International Journal of Cyber-Security andDigital Forensics, vol. 5, no. 3, pp115-121.
  7. H.Alsaiari,M.Papadaki, P.Dowland and S.Furnell.2016. “Graphical One-Time Password (GOTPass): A Usability Evaluation” Information Security Journal: A GlobalPerspective, vol. 25. Issue 1-3, pp94-108.
  8. S.Alqahtany, N.Clarke, S.Furnelland C.Reich. 2016. “A ForensicAcquisition and Analysis System for IaaS”, ClusterComputing, vol. 19, issue. 1, pp439-453.
  9. N.Sohrabi Safa, R.von Solms and S.Furnell. 2016. “Informationsecurity policy compliance model in organizations”, Computers & Security, 56, pp70-82.
  10. H.Alsaiari,M.Papadaki, P.Dowland and S.Furnell.2015. “Secure Graphical One Time Password (GOTPass): An Empirical Study”, Information Security Journal: A GlobalPerspective, vol. 24, issue 4-6, pp207-220.
  11. S.Alotaibi, S.Furnell,and N.Clarke. 2015. “A Fine-Grained Analysis of User Activity on MobileApplications: The Sensitivity Level Perception”, International Journal for Information Security Research, vol. 5,no. 3, pp591-599.
  12. M.Ouedraogo, S.Mignon,H.Cholez, E.Dubois and S.Furnell.2015. “Security Transparency: The Next Frontier for Security Research in theCloud”, Journal of Cloud Computing:Advances, Systems and Applications, vol. 4, no. 12.
  13. E.Sheriff and S.Furnell. 2015. “A Conceptual Modelfor Cultivating an Information Security Culture”, International Journal for Information Security Research, vol. 5,no. 2, pp565-573.
  14. H.Saevanee, N.Clarke and S.Furnell. 2015. “Continuous userauthentication using multi-modal biometrics", Computers& Security, 53, pp234-246.
  15. N.SohrabiSafa, M.Sookhak, R. Von Solms, S.Furnell,N.A.Ghani, T.Herawan. 2015. “Information Security Conscious Care BehaviourFormation in Organizations”, Computers& Security, 53, pp65-78.
  16. N.H.Abd Rahim,S.Hamid, L.Mat Kiah, S.Shamshirband and S.Furnell.2015. “A systematic review of approaches to assessing cybersecurity awareness”,Kybernetes, vol. 44, iss. 4, pp606-622.
  17. A.Akhunzada,M.Sookhak; N.B.Anuar, A.Gani, E.Ahmed, M.Shiraz, S.Furnell, A.Hayat and M.K.Khan. 2015. “Man-At-The-End Attacks:Analysis, Taxonomy, Human Aspects, Motivation and Future Directions”, Journal of Network and Computer Applications,vol. 48, February 2015, pp44-57.
  18. W.Meng,D.S.Wong, S.Furnell and J.Zhou.2015. “Surveying the Development of Biometric User Authentication on MobilePhones”, IEEE Communications Surveys andTutorials, vol. 17, no. 3, pp. 1268 – 1293.
  19. M.A.Harris, S.Furnell and K.Patten. 2014.“Comparing the Mobile Device Security Behavior of College Students andInformation Technology Professionals”, Journalof Information Privacy and Security, vol. 10, no. 4, pp186-202.
  20. E.Kaspersky andS.Furnell. 2014. “A securityeducation Q&A”, InformationManagement and Computer Security, vol. 22, no. 2, pp130-133.
  21. H.J.Mattord, Y.Levyand S.Furnell. 2014. “Factors forMeasuring Password-Based Authentication Practices”, Journal of Information Privacy and Security, vol. 10, no. 2, 71-94,DOI: 10.1080/15536548.2014.924812.
  22. S.Shamshirband,A.Amini, N.B.Anuar, L. Mat Kiah, T.Ying Wah and S.Furnell. 2014. “D-FICCA: A Density-based Fuzzy ImperialistCompetitive Clustering Algorithm for Intrusion Detection in Wireless SensorNetworks”, Measurement, vol. 55,pp212-226.
  23. M.Z.Jali, S.M.Furnell and P.S.Dowland. 2014. “Investigatingthe Viability of Multifactor Graphical Passwords for User Authentication”, Information Security Journal: A Global Perspective, vol. 23, issue 1-2,pp10-21.

Other journal outputs

  1. S.Furnell and I.Vasileiou. 2017. “Security Education and Awareness: Just let them burn?”, Network Security, December 2017.
  2. S.Furnell and D.Emm. 2017. “The ABC of Ransomware Protection”, Computer Fraud & Security, October 2017, pp5-11.
  3. S.Furnell, P.Fischer and A.Finch. 2017. “Can’t get the staff? The growing need for cyber-security skills“, Computer Fraud & Security, February 2017, pp5-10.
  4. S.Furnell and R.Esmael. 2017. “Evaluating the effect of guidance and feedback upon password compliance”,Computer Fraud & Security, January 2017, pp5-10
  5. S.Furnell. 2016. “The usability of security - revisited”, Computer Fraud & Security, September 2016, pp5-11.
  6. S.Furnell. 2016. “Vulnerability management: not a patch on where we should be?”, Network Security, April 2016, pp5-9.
  7. S.Furnell, D.Emm and M.Papadaki. 2015. “The challenge of measuring cyber-dependent crimes”, October 2015, pp5-12.
  8. S.Furnell. 2015. “Managing privacy settings: Lots of options, but beyond control?”, Computer Fraud & Security, April 2015, pp8-13.
  9. S.Furnell. 2014. “Password practices on leading websites – revisited”, Computer Fraud & Security, December 2014, pp5-11.
  10. S.Furnell, J.van Niekerk and N.Clarke. 2014. “The Price of Patching”, Computer Fraud & Security, August 2014, pp8-13.
  11. S.Furnell and L.Moore. 2014. “Security literacy: the missing link in today’s online society?”, Computer Fraud & Security, May 2014, pp12-18.
  12. S.Furnell and N.Clarke. 2014. “Biometrics: making the mainstream”, Biometric Technology Today, January 2014, pp5-9.

Refereed conference contributions     

  1. N.Clarke, F.Li, A.Alruban and S.Furnell. 2017. ”Insider Misuse Identification using Transparent Biometrics”, in Proceedings of the 50th Hawaii International Conference on System Sciences (HICSS-50), Hilton Waikoloa Village, Hawaii, 4-7 January 2017, pp4031-4040.
  2. M.Alotaibi, S.Furnell and N.Clarke. 2016. " Information Security Policies: A review of Challenges and Influencing Factors", in Proceedings of the 11th International Conference for Internet Technology and Secured Transactions (ICITST-2016), Barcelona, Spain, 5-7 December 2016, pp352-358.
  3. G.Alotibi, N.Clarke, F.Fudong and S.Furnell. 2016. “User Profiling from Network Traffic via Novel Application-Level Interactions”, in Proceedings of the 11th International Conference for Internet Technology and Secured Transactions (ICITST-2016), Barcelona, Spain, 5-7 December 2016, pp279-285.
  4. F.Alotaibi, S.Furnell, I.Stengel and M.Papadaki. 2016. “A Survey of Cyber Security Awareness in Saudi Arabia”, in Proceedings of the 11th International Conference for Internet Technology and Secured Transactions (ICITST-2016), Barcelona, Spain, 5-7 December 2016, pp154-158.
  5. S.Alqahtany, N.Clarke, S.Furnell and C.Reich. 2016. “A Forensic Acquisition and Analysis System for IaaS: Architectural Model and Experiment”, Proceedings of 11th International Conference on Availability, Reliability and Security (ARES 2016), Salzburg, Austria, 31 August – 2 September 2016.
  6. A.Alruban, N.L.Clarke, F.Li and S.M.Furnell. 2016. “Proactive Biometric-Enabled Forensic Imprinting”, International Conference on Cyber Incident Response, Coordination, Containment & Control (Cyber Incident 2016), June 13-14, London, UK, 2016.
  7. N.L.Clarke, F.Li, S.M.Furnell, I.Stengel I and G.Ganis. 2016. “Information Security and Practice: The User's Perspective”, Proceedings of the 11th International Conference On Cyber Warfare and Security (ICCWS-2016), Boston, USA, 17-18 March 2016, pp81-89.
  8. R.B.Batie,Y.Levy, S.Furnell and P.Liu. 2015. Improving User Authentication with Fingerprint Biometrics and Biometric Personal Identification Number (BIO-PINTM) as a Multi-Factor Authentication Mechanism”, to appear in Proceedings of Workshop on Information Security and Privacy (WISP), Fort Worth, Texas, 13December 2015.
  9. M.Alotaibi, S.Furnell and N.Clarke. 2015. “Towards Dynamic Adaption of User’s Organisational Information Security Behaviour”, 2015 SRI Security Congress, Perth, Australia, 30 November - 2 December 2015.
  10. S.N.Alotaibi, S.Furnell and N.Clarke. 2015. "Transparent Authentication Systems for Mobile Device Security: A Review", 10th International Conference for Internet Technology and Secured Transactions (ICITST-2015), London, UK
  11. S.Furnell and L.Moore. 2014. “End-user security: No longer a matter of choice?”, Proceedings of the 13th Annual Security Conference, Las Vegas, Nevada, 21-23 May 2014.
  12. S.Furnell and B.Mushens. 2014. “Using iPads to enable cultural change in Technology Enhanced Learning: A case study”, ihe 2014: 1st International Conference on the use of iPads in Higher Education, Paphos, Cyprus, 20-22 March 2014. 

Edited books

  1. W.Meng, X.Luo, S.Furnell and J.Zhou. 2017. Protecting Mobile Networks and Devices. CRC Press. ISBN 978-1-4987-3583-4. 319pp.
  2. Katsikas, S., Lambrinoudakis, C, and Furnell, S. 2016. Trust, Privacy and Security in Digital Business - 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings. Lecture Notes in Computer Science 9830, Springer, ISBN 978-3-319-44340-9.123pp.
  3. Furnell, S.M. and Clarke, N.L. 2015. Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2015), Lesvos,Greece, July 1-3, ISBN 978-1-84102-388-5, 295pp.
  4. Clarke, N.L and Furnell, S.M. 2016. Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), Frankfurt, Germany, July 19-21, ISBN 978-1-84102-413-4, 313pp.
  5. Clarke, N.L and Furnell, S.M. 2014. Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2014). Plymouth,8-10 July, ISBN 978-1-84102-375-5, 239pp.
  6. Dowland, P.S, Furnell, S.M and Ghita, B.V. 2014. Proceedings of the Tenth International Network Conference (INC 2014), Plymouth, 8-10 July 2014, ISBN978-1-84102-373-1, 197pp.

Chapters in books

  1. S.Furnell. 2016. “The Evolving Landscape of Technology-Dependent Crime”, in The Routledge Handbook of Technology, Crime and Justice.  M.R.McGuire and T.J.Holt (Eds), Routledge International Handbooks.

Other published output

  1. S.Furnell. 2017. “Understanding Cyber Security Skills - a framework for clarity”, IISP Pulse, Issue 24, Winter 2017, p16-17.
  2. S.Furnell. 2016. “Suffering Security Lag?”, InfoSecurity, vol. 13, no. 1, pp29-30.
  3. S.Furnell. 2016. “Getting more for less: Reflecting on the numbers in the IT revolution”, Significance, 12 January 2016.
  4. S.Furnell. 2015. “Cybersecurity – Skills for the masses”, IISP Pulse, Issue 19, Summer 2015, p24-25.

Key publications are highlighted

Journals
Articles
Vo TH, Fuhrmann W, Fischer-Hellmann K-P & Furnell S 2019 'Identity-as-a-Service: An Adaptive Security Infrastructure and Privacy-Preserving User Identity for the Cloud Environment' Future Internet 11, (5) 116-116 , DOI PEARL
Alotaibi S, Furnell S & Clarke N 2019 'A Novel Transparent User Authentication Approach for Mobile Applications' Information Security Journal: A Global Perspective 27, (5-6) 292-305 , DOI PEARL
Cong Pham H, Brennan L & Furnell SM 2019 'Information security burnout: Identification of sources and mitigating factors from security demands and resources' Journal of Information Security and Applications 46, (June) 96-107 , DOI PEARL
Safa N, Maple C, Furnell SM, Azad M, Perera C & Dabbagh M 2019 'Deterrence and Prevention-based Model to Mitigate Information Security Insider Threats in Organisations' Future Generation Computer Systems , DOI PEARL
Alotaibi M, Furnell SM & Clarke N 2019 'A Framework for Reporting and Dealing with End-User Security Policy Compliance' Information and Computer Security 27, (1) 2-25 , DOI PEARL
Furnell SM & Dowling S 2019 'Cyber crime: A portrait of the landscape' Journal of Criminological Research, Policy and Practice , DOI PEARL
Furnell S & Spafford EH 2019 'The Morris Worm at 30' ITNOW 61, (1) 32-33 , DOI
Furnell S & Clarke N 2018 'Inhabiting the Biometric Society' ITNOW 60, (3) 42-43 , DOI
Furnell S 2018 'Assessing website password practices – over a decade of progress?' Computer Fraud and Security 2018, (7) 6-13 , DOI
Furnell S & Clarke N 2018 'Guest editorial' Information and Computer Security 26, (3) 262-263 , DOI
Clarke N, Alohali M, Li F & Furnell S 2018 'Identifying and Predicting the Factors Affecting End-Users’ Risk-Taking Behavior' Information and Computer Security 26, (3) 306-326 , DOI PEARL
Meng W, Choo K-KR, Furnell S, Vasilakos AV & Probst CW 2018 'Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks' IEEE Transactions on Network and Service Management 15, (2) 761-773 , DOI PEARL
Furnell SM, Khern-am-nuai W, Esmael R, Yang W & Li N 2018 'Enhancing security behaviour by supporting the user' Computers and Security , DOI PEARL
Alohali M, Clarke N & Furnell S 2018 'The Design and Evaluation of a User-Centric Information Security Risk Assessment and Response Framework' International Journal of Advanced Computer Science and Applications 9, (10) , DOI
Sohrabi Safa N, Maple C, Watson T & Furnell SM 2017 'Information security collaboration formation in organisations' IET Information Security , DOI PEARL
Furnell S & Vasileiou I 2017 'Security education and awareness: just let them burn?' Network Security 2017, (12) 5-9 , DOI PEARL
Furnell S & Emm D 2017 'The ABC of ransomware protection' Computer Fraud and Security 2017, (10) 5-11 , DOI
Clarke N, Furnell S & Li F 2017 'A novel privacy preserving user identification approach for network traffic' Computers and Security , DOI PEARL
Furnell S, Fischer P & Finch A 2017 'Can't get the staff? The growing need for cyber-security skills' Computer Fraud & Security 2017, (2) 5-10 , DOI
Furnell S & Esmael R 2017 'Evaluating the effect of guidance and feedback upon password compliance' Computer Fraud & Security 2017, (1) 5-10 , DOI
Feizollah A, Anuar NB, Salleh R, Suarez-Tangil G & Furnell S 2016 'AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection' Computers & Security , DOI PEARL
Furnell S 2016 'The usability of security – revisited' Computer Fraud & Security 2016, (9) 5-11 , DOI
Al Fahdi M, Clarke NL, Li F & Furnell SM 2016 'A suspect-oriented intelligent and automated computer forensic analysis' DIGITAL INVESTIGATION 18, 65-76 Author Site , DOI PEARL
Furnell S & Clarke N 2016 'Guest editorial' Information and Computer Security 24, (2) 138-138 , DOI
Alsaiari H, Papadaki M, Haskell-Dowland P & Furnell SM 2016 'Graphical One-Time Password (GOTPass): A usability evaluation' Information Security Journal: A Global Perspective 25, (1-3) Publisher Site , DOI PEARL
Furnell S 2016 'Vulnerability management: not a patch on where we should be?' Network Security 2016, (4) 5-9 , DOI
Sohrabi Safa N, Von Solms R & Furnell S 2016 'Information security policy compliance model in organizations' Computers & Security 56, 70-82 , DOI
Clarke N, Symes J, Saevanee H & Furnell S 2016 'Awareness of Mobile Device Security' International Journal of Mobile Computing and Multimedia Communications 7, (1) 15-31 , DOI
Alsaiari H, Papadaki M, Dowland P & Furnell S 2015 'Secure Graphical One Time Password (GOTPass): An Empirical Study' Information Security Journal: A Global Perspective 24, (4-6) 207-220 , DOI
Al Abdulwahid A, Clarke N, Stengel I, Furnell S & Reich C 2015 'Continuous and transparent multimodal authentication: reviewing the state of the art' Cluster Computing 19, (1) 455-474 , DOI PEARL
Alqahtany S, Clarke N, Furnell S & Reich C 2015 'A forensic acquisition and analysis system for IaaS' Cluster Computing 19, (1) 439-453 , DOI PEARL
Furnell S, Emm D & Papadaki M 2015 'The challenge of measuring cyber-dependent crimes' Computer Fraud & Security 2015, (10) 5-12 , DOI
Saevanee H, Clarke N, Furnell S & Biscione V 2015 'Continuous user authentication using multi-modal biometrics' Computers & Security 53, 234-246 , DOI PEARL
Safa NS, Sookhak M, Von Solms R, Furnell S, Ghani NA & Herawan T 2015 'Information security conscious care behaviour formation in organizations' Computers & Security 53, 65-78 , DOI
Ouedraogo M, Mignon S, Cholez H, Furnell S & Dubois E 2015 'Security transparency: the next frontier for security research in the cloud' Journal of Cloud Computing 4, (1) , DOI
Rahim NHA, Hamid S, Mat Kiah ML, Shamshirband S & Furnell S 2015 'A systematic review of approaches to assessing cybersecurity awareness' Kybernetes 44, (4) 606-622 , DOI
Furnell S 2015 'Managing privacy settings: lots of options, but beyond control?' Computer Fraud & Security 2015, (4) 8-13 , DOI
Akhunzada A, Sookhak M, Anuar NB, Gani A, Ahmed E, Shiraz M, Furnell S, Hayat A & Khurram Khan M 2015 'Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions' Journal of Network and Computer Applications 48, 44-57 , DOI
Meng W, Wong DS, Furnell S & Zhou J 2015 'Surveying the Development of Biometric User Authentication on Mobile Phones' IEEE Communications Surveys & Tutorials 17, (3) 1268-1293 , DOI
Furnell S 2014 'Password practices on leading websites – revisited' Computer Fraud & Security 2014, (12) 5-11 , DOI
Shamshirband S, Amini A, Anuar NB, Mat Kiah ML, Teh YW & Furnell S 2014 'D-FICCA: A density-based fuzzy imperialist competitive clustering algorithm for intrusion detection in wireless sensor networks' Measurement 55, 212-226 , DOI
Furnell S, van Niekerk J & Clarke N 2014 'The price of patching' Computer Fraud & Security 2014, (8) 8-13 , DOI
Furnell S & Moore L 2014 'Security literacy: the missing link in today's online society?' Computer Fraud & Security 2014, (5) 12-18 , DOI
Jali MZ, Furnell SM & Dowland PS 2014 'Investigating the Viability of Multifactor Graphical Passwords for User Authentication' Information Security Journal: A Global Perspective 23, (1-2) 10-21 , DOI
Furnell S & Clarke N 2014 'Biometrics: making the mainstream' Biometric Technology Today 2014, (1) 5-9 , DOI
Furnell SM 2013 'Cooperative user identity verification using an Authentication Aura' Computers & Security n/a, (n/a)
Anuar NB, Papadaki M, Furnell S & Clarke N 2013 'A response selection model for intrusion response systems: Response Strategy Model (RSM)' Security and Communication Networks 7, (11) 1831-1848 , DOI
Hocking CG, Furnell SM, Clarke NL & Reynolds PL 2013 'Co-operative user identity verification using an Authentication Aura' COMPUTERS & SECURITY 39, 486-502 Author Site , DOI
2013 'Editorial' Computers & Security 39, 1-1 , DOI
Rajarajan M & Furnell S 2013 'Editorial for Security and Privacy in Wireless Networks Special Issue' Mobile Networks and Applications 18, (5) 664-665 , DOI
Furnell S 2013 'Still on the hook: the persistent problem of phishing' Computer Fraud & Security 2013, (10) 7-12 , DOI
Anuar NB, Papadaki M, Furnell SM & Clarke N 2013 'Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM)' Security and Communication Networks 6, (9) 1087-1116 , DOI
Furnell S 2013 'Getting past passwords' Computer Fraud & Security 2013, (4) 8-13 , DOI
Komatsu A, Takagi D & Takemura T 2013 'Human aspects of information security' Information Management & Computer Security 21, (1) 5-15 , DOI
Anuar NB, Papadaki M, Furnell SM & Clarke N 2012 'Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM)' Security and Communication Networks , DOI
Harris M & Furnell S 2012 'Routes to security compliance: be good or be shamed?' Computer Fraud & Security 2012, (12) 12-20 , DOI
Furnell S 2012 'Disguising the dangers: hiding attacks behind modern masks' Computer Fraud & Security 2012, 9-13
Furnell S & Phippen A 2012 'Online privacy: a matter of policy?' Computer Fraud & Security 2012, 12-18
Furnell S & Clarke N 2012 'Power to the people? The evolving recognition of human aspects of security' Computers & Security
Furnell S & Rajendran A 2012 'Understanding the influences on information security behaviour' Computer Fraud & Security 2012, 12-15
Hocking CG, Furnell SM, Clarke NL & Reynolds PL 2011 'Authentication Aura - A distributed approach to user authentication' Journal of Information Assurance and Security 6, (2) 149-156 Publisher Site
Hocking CG, Furnell SM, Clarke NL & Reynolds PL 2011 'Authentication Aura - A distributed approach to user authentication' Journal of Information Assurance and Security 6, (2) 149-156 Publisher Site
Hocking CG, Furnell SM, Clarke NL & Reynolds PL 2011 'A preliminary investigation of distributed and cooperative user authentication'
Anuar NB, Furnell S, Papadaki M & Clarke N 2011 'A risk index model for security incident prioritisation'
Furnell S 2011 'Assessing password guidance and enforcement on leading websites' Computer Fraud & Security 2011, 10-18
Talib S, Clarke NL & Furnell SM 2011 'Establishing A Personalized Information Security Culture' International Journal of Mobile Computing and Multimedia Communications (IJMCMC) 3, 63-79
Magklaras G, Furnell S & Papadaki M 2011 'LUARM: An Audit Engine for Insider Misuse Detection' International Journal of Digital Crime and Forensics (IJDCF) 3, 37-49
Furnell S, von Solms R & Phippen A 2011 'Preventative actions for enhancing online protection and privacy' International Journal of Information Technologies and Systems Approach (IJITSA) 4, 1-11
Tjhai GC, Furnell SM, Papadaki M & Clarke NL 2010 'A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm' COMPUTERS & SECURITY 29, (6) 712-723 Author Site , DOI
Jali MZ, Furnell SM & Haskell-Dowland PS 2010 'Assessing image-based authentication techniques in a web-based environment' Information Management & Computer Security 18, (1) 43-53
Hocking CG, Furnell S, Clarke N & Reynolds PL 2010 'A distributed and cooperative user authentication framework'
Tjhai GC, Furnell SM, Papadaki M & Clarke NL 2010 'A preliminary two-stage alarm correlation and filtering system using SOM neural network and< i> K</i>-means algorithm' Computers & Security 29, 712-723
Anuar NB, Papadaki M, Furnell S & Clarke N 2010 'An investigation and survey of response options for Intrusion Response Systems (IRSs)' Information Security for South Africa (ISSA) 2010, 1-8
Sanders B, Furnell S, Dowland P & Atkinson S 2010 'Massively Multi-Player Online Role Playing Games: What’s the Risk?' Journal of Virtual Worlds Research 3,
Furnell S, von Solms R & Phippen A 2009 'Recognising and Addressing Barriers to eSafety and Security Awareness' Computer Fraud & Security
Razak SA, Samian N, Ma'arof MA, Furnell SM, Clarke NL & Brooke PJ 2009 'A Friend Mechanism for Mobile Ad Hoc Networks' Journal of Information Assurance and Security 4, (4) 440-448
Gritzalis D & Furnell S 2009 'Editorial' Computers & Security 28, (7) 491-492 , DOI
Werlinger R, Hawkey K & Beznosov K 2009 'An integrated view of human, organizational, and technological challenges of IT security management' Information Management & Computer Security 17, (1) 4-19 , DOI
Botha RA, Furnell SM & Clarke NL 2009 'From desktop to mobile: Examining the security experience' COMPUTERS & SECURITY 28, (3-4) 130-137 Author Site , DOI
Anuar NB, Furnell SM, Papadaki M & Clarke NL 2009 'Response Mechanisms for Intrusion Response Systems (IRSs)'
Phippen A, Davey R & Furnell S 2009 'Should we do it just because we can? Methodological and ethical implications for information revelation in online social networks' Methodological Innovations Online 4, 41-55
Atkinson S, Furnell S & Phippen A 2009 'Using Peer education to encourage safe online behaviour' LSE Eu Kids Online
Furnell SM, Tsaganidi V & Phippen AD 2008 'Security beliefs and barriers for novice Internet users' Computers & Security 27, (7-8) 235-240
Razak SA, Furnell SM, Clarke NL & Brooke PJ 2008 'Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks' AD HOC NETWORKS 6, (7) 1151-1167 Author Site , DOI
Furnell S, Tsaganidi V & Phippen A 2008 'Security beliefs and barriers for novice Internet users' COMPUTERS & SECURITY 27, (7-8) 235-240 Author Site , DOI
Phippen A & Furnell S 2007 'Taking responsibility for online protection – why citizens have their part to play' Computer Fraud & Security 11, 8-13
Furnell S & Clarke N 2007 'Guest editorial' Information Management & Computer Security 15, (5) , DOI
Furnell S 2007 'A comparison of website user authentication mechanisms' Computer Fraud & Security 9, 5-9
Schilke SW, Bleimann U, Furnell SM & Phippen AD 2007 'Multi-dimensional-personalisation-in “whom” we trust? Perception of trust & privacy' SEIN 2007: Proceedings of the Third Collaborative Research Symposium on Security, E-Learning, Internet and Networking 11-11
Al-Tawqi M & Furnell SM 2007 'Security Technologies: Why are they not used correctly?' Advances in Networks, Computing and Communications 4 164-164
Furnell SM 2007 'Phishing: can we spot the signs?' Computer Fraud & Security 3, 10-15
Exarchakos G, Antonopoulos N & Salter J 2007 'G‐ROME: semantic‐driven capacity sharing among P2P networks' Internet Research 17, (1) 7-20 , DOI
Steven Furnell P 2007 'The Sixth International Network Conference (INC 2006)' Internet Research 17, (1) , DOI
Furnell S 2007 'IFIP workshop – Information security culture' Computers & Security 26, (1) 35-35 , DOI
Tucker CJ, Furnell SM, Ghita BV & Brooke PJ 2007 'A new taxonomy for comparing intrusion detection systems' Internet Research 17, (1) 88-98
Rodwell PM, Furnell SM & Reynolds PL 2007 'A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head' Computers & Security 26, (7-8) 468-478
Rodwell PM, Furnell SM & Reynolds PL 2007 'A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head' COMPUTERS & SECURITY 26, (7-8) 468-478 Author Site , DOI
Clarke NL & Furnell SM 2007 'Advanced user authentication for mobile devices' Computers & Security 26, (2) 109-119
Clarke NL & Furnell SM 2007 'Advanced user authentication for mobile devices' COMPUTERS & SECURITY 26, (2) 109-119 Author Site , DOI
Karakasiliotis A, Furnell SM & Papadaki M 2007 'An assessment of end-user vulnerability to phishing attacks' Journal of Information Warfare 6, (1) 17-28
Furnell S 2007 'An assessment of website password practices' Computers & Security 26, (7-8) 445-451
Furnell S 2007 'An assessment of website password practices' COMPUTERS & SECURITY 26, (7-8) 445-451 Author Site , DOI
Fischer KP, Bleimann U, Fuhrmann W & Furnell SM 2007 'Analysis of security-relevant semantics of BPEL in cross-domain defined business processes' Information Management & Computer Security 15, (2) 116-127
Furnell SM, Bryant P & Phippen AD 2007 'Assessing the security perceptions of personal Internet users' Computers & Security 26, (5) 410-417
Furnell SM, Bryant P & Phippen AD 2007 'Assessing the security perceptions of personal Internet users' COMPUTERS & SECURITY 26, (5) 410-417 Author Site , DOI
Chatziapostolou D & Furnell SM 2007 'Assessing the usability of system-initiated and user-initiated security events' Proceedings of ISOneWorld
Clarke NL & Furnell SM 2007 'Authenticating mobile phone users using keystroke analysis' INTERNATIONAL JOURNAL OF INFORMATION SECURITY 6, (1) 1-14 Author Site , DOI
Clarke NL & Furnell SM 2007 'Authenticating mobile phone users using keystroke analysis' International Journal of Information Security 6, (1) 1-14
Preuß J, Furnell SM & Papadaki M 2007 'Considering the potential of criminal profiling to combat hacking' Journal in Computer Virology 3, 135-141
Furnell S 2007 'Identity impairment: The problems facing victims of identity fraud' Computer Fraud & Security 12, 6-11
Furnell S 2007 'IFIP workshop - Information security culture' Computers & Security 26, (1) 35-35
Furnell S 2007 'Making security usable: Are things improving?' COMPUTERS & SECURITY 26, (6) 434-443 Author Site , DOI
Furnell S 2007 'Making security usable: Are things improving?' Computers & Security 26, (6) 434-443
Phyo AH, Furnell SM & Phippen AD 2007 'Prerequisites for monitoring insider IT misuse' Proceedings of the Third Collaborative Research Symposium Security, E-Learning, Internet and Networking (SEIN 2007) 41-52
Furnell S & Evangelatos K 2007 'Public awareness and perceptions of biometrics' Computer Fraud & Security 1, 8-13
Fischer-Hubner S, Furnell S & Lambrinoudakis C 2007 'Special issue - TrustBus 2006' Computer Systems Science and Engineering 22, (5) 241-242
Fischer-Hubner S, Furnell S & Lambrinoudakis C 2007 'Special Issue: TrustBus 2006' Computer Systems Science and Engineering 22, 241-241
Furnell S 2007 'The Sixth International Network Conference (INC 2006) - Guest editorial' Internet Research 17, (1) 5-6
Furnell SM 2006 'Safety in numbers? Early experiences in the age of chip and PIN' Computer Fraud & Security 4, 4-7
Clarke NL & Furnell SM 2006 'A Composite User Authentication Architecture for Mobile Devices' Journal of Information Warfare 5, (2) 11-29
Razak SA, Fumell S, Clarke N & Brooke P 2006 'A two-tier intrusion detection system for mobile ad hoc networks - A friend approach' Intelligence and Security Informatics, Proceedings 3975, 590-595
Papadaki M & Furnell SM 2006 'Achieving Automated Intrusion Response: A Prototype Implementation' Information Management & Computer Security 14, (3) 235-251
Karakasiliotis A, Furnell SM & Papadaki M 2006 'Assessing end-user awareness of social engineering and phishing'
Ghita B & Furnell S 2006 'Assessing the usability of WLAN security for SOHO users'
Katsabas D, Furnell S & Dowland P 2006 'Evaluation of end-user application security from a usability perspective'
Furnell SM 2006 'Malicious or misinformed? Exploring a contributor to the insider threat' Computer Fraud & Security 9, 8-12
Furnell S & Ward J 2006 'Malware: An evolving threat' Digital crime and forensic science in cyberspace 27-29
Furnell S & Zekri L 2006 'Replacing passwords: in search of the secret remedy' Network Security 2006, 4-8
Lacohee H, Phippen AD & Furnell SM 2006 'Risk and restitution: Assessing how users establish online trust' COMPUTERS & SECURITY 25, (7) 486-493 Author Site , DOI
Lacohee H, Phippen AD & Furnell SM 2006 'Risk and restitution: Assessing how users establish online trust' Computers & Security 25, (7) 486-493
Furnell S 2006 'Securing mobile devices: technology and attitude' Network Security 2006, 9-13
Furnell S 2006 'Securing the home worker' Network Security 2006, 6-12
Fischer K, Bleimann U, Fuhrmann W & Furnell S 2006 'Security-Relevant Semantic Patterns of BPEL in Cross-Organisational Business Processes'
Furnell SM, Jusoh A & Katsabas D 2006 'The challenges of understanding and using security: A survey of end-users' COMPUTERS & SECURITY 25, (1) 27-35 Author Site , DOI
Furnell SM, Jusoh A & Katsabas D 2006 'The challenges of understanding and using security: A survey of end-users' Computers & Security 25, (1) 27-35
Magklaras GB, Furnell SM & Brooke PJ 2006 'Towards an Insider Threat Prediction Specification Language' Information Management & Computer Security 14, (4) 361-381
Furnell S & Ghita B 2006 'Usability pitfalls in Wireless LAN security' Network Security 2006, 4 - 8-4 - 8 Publisher Site , DOI
Schilke SW, Bleimann U, Furnell SM & Phippen AD 2005 'A Chinese Wall approach for Anonymous Recommendation in a Multi-Dimensional-Personalisation Scenario' 3rd International Conference: Sciences of Electronic, Technologies of Information and Telecommunications
Magklaras GB & Furnell SM 2005 'A preliminary model of end user sophistication for insider threat prediction in IT systems' COMPUTERS & SECURITY 24, (5) 371-380 Author Site , DOI
Magklaras GB & Furnell SM 2005 'A preliminary model of end user sophistication for insider threat prediction in IT systems' Computers & Security 24, (5) 371-380
Fischer K, Bleimann U, Fuhrmann W & Furnell S 2005 'A Security Infrastructure for Cross-Domain Development of Script-Based Business Processes in SOC Environments'
Alayed A, Furnell SM, Zhao D & Dowland PS 2005 'An automated framework for managing security vulnerabilities' Information Management & Computer Security 13, (2) 156-166
Furnell SM 2005 'Authenticating ourselves: will we ever escape the password?' Network Security 38412, 8-13
Clarke NL & Furnell SM 2005 'Authentication of users on mobile telephones - A survey of attitudes and practices' Computers & Security 24, (7) 519-527
Clarke NL & Furnell SM 2005 'Authentication of users on mobile telephones–A survey of attitudes and practices' Computers & Security 24, 519-527
Furnell S, Jusoh A, Katsabas D & Phippen A 2005 'Barriers to usable security in end-user applications' eMinds: International Journal on Human-Computer Interaction 1, (1) 51-59
Clarke NL & Furnell SM 2005 'Biometrics - The promise versus the practice' Computer Fraud and Security September, 12-16
Clarke NL & Furnell SM 2005 'Biometrics: No silver bullets' Computer Fraud and Security August, 9-14
Furnell S, Katos V & Clarke N 2005 'Considering the role of academic qualifications for IT security professionals'
Furnell S 2005 'External Influences and Dependencies' Computer Insecurity 147-178
Furnell SM 2005 'Handheld hazards: The rise of malware on mobile devices' Computer Fraud & Security 5, 4-8
Papadaki M & Furnell S 2005 'Informing the decision process in an automated intrusion response system' Information Security Technical Report 10, (3) 150-161
Furnell SM 2005 'Internet threats to end-users: Hunting easy prey' Network Security 7, 5-9
Furnell S 2005 'The Problem of Computer Insecurity' Computer Insecurity 1-15
Furnell SM, Katos V & Clarke NL 2005 'The role of academic qualifications in the IT security profession' DATAWATCH, Information Systems Audit and Control Association (ISACA) winter, 8-15
Clarke N & Furnell S 2005 'User authentication for mobile devices: a composite approach'
Katsabas D, Furnell S & Dowland P 2005 'Using Human Computer Interaction principles to promote usable security'
Furnell S 2005 'Why users cannot use security' Computers & Security 24, (4) 274-279
Furnell S 2005 'Why users cannot use security' COMPUTERS & SECURITY 24, (4) 274-279 Author Site , DOI
Furnell S 2004 'The 4th International Network Conference (INC 2004)' Internet Research 14, (5) , DOI
Wilkie DA & Davidson M 2004 'Preface' Veterinary Ophthalmology 7, (5) 283-283 , DOI
Furnell S & Bolakis S 2004 'Helping us to help ourselves' Network Security 2004, (2) 7-12 , DOI
Furnell SM, Papadopoulos I & Dowland PS 2004 'A long-term trial of alternative user authentication technologies' Information Management and Computer Security 12, (2) 178-190
Phippen A, Sheppard L & Furnell S 2004 'A practical evaluation of Web analytics' INTERNET RESEARCH-ELECTRONIC NETWORKING APPLICATIONS AND POLICY 14, (4) 284-293 Author Site , DOI
Phippen A, Sheppard L & Furnell S 2004 'A practical evaluation of Web analytics' Internet Research-Electronic Networking Applications and Policy 14, (4) 284-293
Furnell SM 2004 'E-commerce security: a question of trust' Computer Fraud & Security Oct, 10-14
Furnell SM 2004 'Enemies within: the problem of insider attacks' Computer Fraud & Security 7, 6-11
Furnell SM 2004 'Getting caught in the phishing net' Network Security 2004, (5) 14-18
Furnell SM 2004 'Hacking begins at home: Are company networks at risk from home computers?' Computer Fraud & Security 1, 4-7
Furnell S & Bolakis S 2004 'Helping us to help ourselves: assessing administrators’ use of security analysis tools' Network security 2004, (2) 12-15
Furnell S & Bolakis S 2004 'Helping us to help ourselves: Assessing administrators’ use of security analysis tools' Network Security 2004, 7-12
Papadaki M & Furnell SM 2004 'IDS or IPS: what is best?' Network Security 7, 15-19
Furnell S & Ward J 2004 'Malware Comes of Age: The arrival of the true computer parasite' Network Security 10, 11-15
Schilke SW, Bleimann U, Furnell SM & Phippen AD 2004 'Multi-dimensional-personalisation for location and interest-based recommendation' Internet Research-Electronic Networking Applications and Policy 14, (5) 379-385
Furnell SM 2004 'Qualified to help: In search of the skills to ensure security' Computer Fraud & Security 12, 10-14
Furnell S & Bolakis S 2004 'Security Admin. Tools: Helping us to help ourselves' Network Security 2004, 7-12
Furnell S 2004 'The 4th International Network Conference (INC 2004)' INTERNET RESEARCH 14, (5) 337-338 Author Site
Furnell S 2004 'The 4th International Network Conference (INC 2004)' Internet Research-Electronic Networking Applications and Policy 14, (5) 337-338
Furnell SM 2004 'Using security: easier said than done?' Computer Fraud & Security 2004, 6-10
Furnell S 2004 'When vulnerability reports can work against us' Network Security 2004, 11-15
Clarke NL 2003 'Keystroke Dynamics on a Mobile Handset: A Feasibility Study' Information Management & Computer Security 11 (4), 161-166 , DOI
Furnell S 2003 'The Third International Network Conference (INC 2002)' Internet Research 13, (2) , DOI
Evans MP & Furnell SM 2003 'A Model for Monitoring and Migrating Web Resources' Campus-Wide Information System 20, (2) 67-74
Furnell S & Phyo AH 2003 'Considering the problem of insider IT misuse' Australian Journal of Information Systems 10, (2) 134-138
Ghita BV, Furnell SM, Lines BM & Ifeachor EC 2003 'Endpoint study of Internet paths and Web pages transfers' Campus-Wide Information Systems 20, 90-97
Papadaki M, Furnell SM, Lee SJ, Lines BM & Reynolds PL 2003 'Enhancing response in intrusion detection systems' Journal of Information Warfare 2, (1) 90-102
Mued L, Lines B, Furnell S & Reynolds P 2003 'The Effects of Audio and Video Correlation and Lip Synchronization' Campus-Wide Information Systems 20, (4) 159-166
Furnell S 2003 'The Third International Network Conference (INC 2002) - Introduction' INTERNET RESEARCH-ELECTRONIC NETWORKING APPLICATIONS AND POLICY 13, (2) 78-79 Author Site
Furnell S 2003 'The Third International Network Conference (INC 2002) - Introduction' Internet Research-Electronic Networking Applications and Policy 13, (2) 78-79
Furnell SM 2003 'Vulnerability exploitation: the problem of protecting our weakest links' Computer Fraud & Security 11, 12-15
Clarke N, Dowland P, Furnell S, Reynolds P & Rodwell P 2002 'Non-Intrusive Biometric Authentication for Mobile Devices' Department of Communication and Electronic Engineering, University of Plymouth, UK, URL: http://ted. see. plym. ac. uk/nrg/presentations/Biometrics_2002. pdf 3,
Furnell SM, Gennatou M & Dowland PS 2002 'A prototype tool for information security awareness and training' International Journal of Logisitics Information Management 15, (5) 352-357
Clarke NL, Furnell SM, Rodwell PM & Reynolds PL 2002 'Acceptance of subscriber authentication methods for mobile telephony devices' COMPUTERS & SECURITY 21, (3) 220-228 Author Site , DOI
Clarke NL, Furnell SM, Rodwell PM & Reynolds PL 2002 'Acceptance of subscriber authentication methods for mobile telephony devices' Computers & Security 21, (3) 220-228
Irakleous I, Furnell SM, Dowland PS & Papadaki M 2002 'An experimental comparison of secret-based user authentication technologies' Information Management & Computer Security 10, (3) 100-108
Irakleous I, Furnell SM, Dowland PS & Papadaki M 2002 'An experimental comparison of secret-based user authentication technologies' Information Management and Computer Security 10, (2-3) 100-108
Ngini CU, Furnell SM & Ghita BV 2002 'Assessing the global accessibility of the Internet' INTERNET RESEARCH-ELECTRONIC NETWORKING APPLICATIONS AND POLICY 12, (4) 329-338 Author Site , DOI
Ngini CU, Furnell SM & Ghita BV 2002 'Assessing the global accessibility of the Internet' Internet Research-Electronic Networking Applications and Policy 12, (4) 329-338
Furnell SM 2002 'Categorising cybercrime and cybercriminals: The problem and potential approaches' Journal of Information Warfare 1, (2) 35-44
Magklaras GB & Furnell SM 2001 'Insider Threat Prediction Tool: Evaluating the probability of IT misuse' Computers & Security 21 (1), 62-73 , DOI
Furnell S 2001 'The Second International Network Conference (INC 2000)' Internet Research 11, (1) , DOI
Magklaras GB & Furnell SM 2001 'Insider threat prediction tool: Evaluating the probability of IT misuse' COMPUTERS & SECURITY 21, (1) 62-73 Author Site
Ghita BV, Furnell SM, Lines BM, Le-Foll D & Ifeachor EC 2001 'Network quality of service monitoring for IP telephony' Internet Research-Electronic Networking Applications and Policy 11, (1) 26-34
Furnell SM, Chiliarchaki P & Dowland PS 2001 'Security analysers: Administrator Assistants or Hacker Helpers?' Information Management and Computer Security 9, (2) 93-101
Furnell SM & Karweni T 2001 'Security issues in Online Distance Learning' Vine 31, (2) 28-35
Papadaki M, Magklaras GB, Furnell SM & Alayed A 2001 'Security vulnerabilities and system intrusions-the need for automatic response frameworks' Proceedings of the IFIP 8th Annual Working Conference on Information Security Management & Small Systems Security, Las Vegas, Setembro de
Evans MP & Furnell SM 2001 'The Resource Locator Service: fixing a flaw in the web' COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING 37, (3-4) 307-330 Author Site , DOI
Evans MP & Furnell SM 2001 'The Resource Locator Service: fixing a flaw in the web' Computer Networks-the International Journal of Computer and Telecommunications Networking 37, (3-4) 307-330
Furnell S 2001 'The Second International Network Conference (INC 2000)' INTERNET RESEARCH-ELECTRONIC NETWORKING APPLICATIONS AND POLICY 11, (1) 8-9 Author Site
Furnell S 2001 'The Second International Network Conference (INC 2000)' Internet Research-Electronic Networking Applications and Policy 11, (1) 8-9
Furnell SM & Dowland PS 2000 'A conceptual architecture for real-time intrusion monitoring' Information Management & Computer Security 8, 65-75
Furnell SM, Dowland PS, Illingworth HM & Reynolds PL 2000 'Authentication and supervision: A survey of user attitudes' Computers & Security 19, 529-539
Evans MP & Furnell SM 2000 'Internet-based security incidents and the potential for false alarms' INTERNET RESEARCH-ELECTRONIC NETWORKING APPLICATIONS AND POLICY 10, (3) 238-245 Author Site , DOI
Furnell S, Evans M & Bailey P 2000 'The Promise of Online Distance Learning: Addressing Academic and Institutional Concerns' Quarterly Review of Distance Education 1, 281-91
Warren MJ & Furnell SM 1999 'CYBER-TERRORISM–THE POLITICAL EVOLUTION OF THE COMPUTER HACKER' Australian Institute of computer ethics conference, July 1999, Lilydale
Furnell S 1999 'The International Network Conference 1998' Internet Research 9, (1) , DOI
Dowland PS, Furnell SM, Illingworth HM & Reynolds PL 1999 'Computer crime and abuse: A survey of public attitudes and awareness' Computers & Security 18, 715-726
Furnell SM & Warren MJ 1999 'Computer hacking and cyber terrorism: The real threats in the new millennium?' COMPUTERS & SECURITY 18, (1) 28-34 Author Site , DOI
Furnell SM, Dowland PS & Sanders PW 1999 'Dissecting the “hacker manifesto”' Information management & computer security 7, 69-75
Furnell SM, Evans MP, Phippen AD & Abu-Rgheff MN 1999 'Online distance learning: expectations, requirements and barriers' Virtual University Journal 2, 34-48
Furnell SM & Karweni T 1999 'Security implications of electronic commerce: a survey of consumers and businesses' INTERNET RESEARCH-ELECTRONIC NETWORKING APPLICATIONS AND POLICY 9, (5) 372-382 Author Site , DOI
Evans MP, Phippen AD, Mueller G, Furnell SM, Sanders PW & Reynolds PL 1999 'Strategies for content migration on the World Wide Web' INTERNET RESEARCH-ELECTRONIC NETWORKING APPLICATIONS AND POLICY 9, (1) 25-34 Author Site , DOI
Furnell S 1999 'The International Network Conference 1998 (INC '98)' INTERNET RESEARCH-ELECTRONIC NETWORKING APPLICATIONS AND POLICY 9, (1) 6-7 Author Site
Furnell SM, Onions PD, Bleimann U, Gojny U, Knahl M, Roder HF & Sanders PW 1998 'A security framework for online distance learning and training' INTERNET RESEARCH-ELECTRONIC NETWORKING APPLICATIONS AND POLICY 8, (3) 236-+ Author Site , DOI
Gritzalis D, Katsikas S, Mavroudakis K, Sanders P & Warren M 1998 'Methods of responding to healthcare security incidents' Medinfo. MEDINFO 9 Pt 2, 1138-1142
Furnell SM, Davey J, Gaunt PN, Louwerse CP, Mavroudakis K & Treacher AH 1998 'The ISHTAR guidelines for healthcare security' Health Informatics Journal 4, 179-183
Furnell SM & Warren MJ 1997 'Computer abuse: Vandalizing the information society' INTERNET RESEARCH-ELECTRONIC NETWORKING APPLICATIONS AND POLICY 7, (1) 61-& Author Site , DOI
Furnell SM, Gaunt PN, Holben RF, Sanders PW, Stockel CT & Warren MJ 1996 'Assessing staff attitudes towards information security in a European healthcare establishment' Medical Informatics 21, (2) 105-112
Furnell SM, Gaunt PN, Holben RF, Sanders PW, Stockel CT & Warren MJ 1996 'Assessing staff attitudes towards information security in a European healthcare establishment' Med Inform (Lond) 21, (2) 105-112 Author Site
Furnell SM, Sanders PW & Warren MJ 1995 'Development of security guidelines for existing healthcare systems' Medical Informatics 20, (2) 139-148
Furnell SM, Sanders PW & Warren MJ 1995 'Development of security guidelines for existing healthcare systems' Med Inform (Lond) 20, (2) 139-148 Author Site
Furnell SM, Gaunt PN, Pangalos G, Sanders PW & Warren MJ 1994 'A generic methodology for health care data security' Med Inform (Lond) 19, (3) 229-245 Author Site
Furnell SM, Clarke NL & Karatzouni S 0 'Beyond the PIN: Enhancing user authentication for mobile devices' Computer Fraud & Security 2008, (8) 12-17
Levy Y, Ramim MM, Furnell SM & Clarke NL 0 'Comparing intentions to use university-provided vs vendor-provided multibiometric authentication in online exams' Campus-Wide Information Systems 28, (2) 102-113
Furnell SM 0 'End-user security culture: A lesson that will never be learnt?' Computer Fraud & Security 2008, (4) 6-9
Furnell SM & Thomson KL 0 'From culture to disobedience: Recognising the varying user acceptance of IT security' Computer Fraud & Security 2009, (2) 5-10
Chipperfield C & Furnell SM 0 'From security policy to practice: Sending the right messages' Computer Fraud & Security 2010, (3) 13-19
Furnell SM & Ward J 0 'It’s a jungle out there: Predators, prey and protection in the online wilderness' Computer Fraud & Security 2008, (10) 3-6
Furnell SM 0 'Jumping security hurdles' Computer Fraud & Security 2010, (6) 10-14
Furnell SM 0 'Mac security: An Apple that can't be bitten?' Network Security 2010, (1) 7-11
Furnell SM 0 'Online identity: Giving it all away?' Information Security Technical Report 15, (2) 42-46
Furnell SM & Thomson KL 0 'Recognising and addressing ‘security fatigue’' Computer Fraud & Security 2009, (11) 7-11
Furnell SM, Papadaki M & Thomson KL 0 'Scare tactics – A viable weapon in the security war?' Computer Fraud & Security 2009, (12) 6-10
Furnell SM, Atkinson S & Phippen A 0 'Securing the next generation: enhancing e-safety awareness among young people' Computer Fraud & Security 2009, (7) 13-19
Gabriel T & Furnell SM 0 'Selecting security champions' Computer Fraud & Security 2011, (8) 8-12
Furnell SM & Ward J 0 'Self-preservation among online prey' Computer Fraud & Security 2008, (11) 9-12
Bakhshi T, Papadaki M & Furnell SM 0 'Social engineering: assessing vulnerabilities in practice' Information Management and Computer Security 17, (1) 53-63
Furnell SM & Botha R 0 'Social networks – access all areas?' Computer Fraud & Security 2011, (5) 14-19
Furnell SM & Papadaki M 0 'Testing our defences or defending our tests: the obstacles to performing security assessment' Computer Fraud & Security 2008, (5) 8-12
Magklaras G & Furnell S 0 'The Insider Threat Prediction and Specification'
Furnell SM 0 'The Irreversible March of Technology' Information Security Technical Report 14, (4) 176-180
Katos V & Furnell SM 0 'The security and privacy impact of criminalising the distribution of hacking tools' Computer Fraud & Security 2008, (7) 9-16
Furnell SM 0 'Usability versus complexity – striking the balance in end-user security' Network Security 2010, (12) 13-17
Papadaki M & Furnell SM 0 'Vulnerability management: an attitude of mind?' Network Security 2010, (10) 4-8
Furnell SM, Shams R & Phippen A 0 'Who guides the little guy? Exploring security advice and guidance from retailers and ISPs' Computer Fraud & Security 2008, (12) 6-10
Books
Vasileiou I; Furnell S 2019 Cybersecurity Education for Awareness and Compliance. IGI Global , DOI
Mori P, Furnell S & Camp O 2018 Preface. 867
Furnell S, Mouratidis H & Pernul G 2018 Preface. 11033 LNCS
2017 The Routledge Handbook of Technology, Crime and Justice. Routledge , DOI
Camp O, Furnell S & Mori P 2017 Preface. 691
Meng W 2016 Protecting Mobile Networks and Devices. Auerbach Publications , DOI
2016 Trust, Privacy and Security in Digital Business. Springer International Publishing , DOI
2013 Trust, Privacy, and Security in Digital Business. Springer Berlin Heidelberg , DOI
GRITZALIS D, FURNELL S & THEOHARIDOU M 2012 Information security and privacy research.
2012 Information Security and Privacy Research. Springer Berlin Heidelberg , DOI
2011 Trust, Privacy and Security in Digital Business. Springer Berlin Heidelberg , DOI
Furnell S, Lambrinoudakis C & Pernul G 2011 Trust, Privacy and Security in Digital Business: 8th International Conference, TrustBus 2011, Toulouse, France, August 29-September 2, 2011, Proceedings. Springer 6863
Furnell S & Dowland P 2010 E-Mail Security. It Governance Pub
Furnell S & Dowland P 2010 E-mail Security: A Pocket Guide. Itgp
Furnell S 2009 Mobile Security. It Governance Ltd
Cofta P, Furnell S & Lacohée H 2009 Understanding Public Perceptions: Trust and Engagement in ICT-Mediated Services. Intl Engineering Consortium
Cofta P, Lacohée H, Phippen A & Furnell S 2009 Understanding Public Perceptions: Trust and Engagement in ICT-Mediated Services. Intl Engineering Consortium
Furnell S & Clarke N 2009 Proceedings of the Third International Symposium on Human Aspects of Information Security & Assurance (HAISA 2009). Lulu. com
Furnell S, Katsikas S & Lioy A 2008 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface. 5185 LNCS
Furnell SM; Katsikas SK; Lopez J; Patel A 2008 Securing information and communications systems. Artech House Publishers
Furnell S, Katsikas SK & Lioy A 2008 Trust, privacy and security in digital business. Springer-Verlag New York Inc
FURNELL S & CLARKE N 2007 International Symposium on Human Aspects of Information Security (HAISA). Emerald 15
Bleimann U, Dowland PS & Furnell S 2007 Proceedings of the Third Collaborative Research Symposium on Security, E-learning, Internet and Networking. University of Plymouth, School Of Computing, Communications And Electronics
Fischer-Hübner S, Furnell S & Lambrinoudakis C 2006 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface. 4083 LNCS
Fischer-Hübner S, Furnell S & Lambrinoudakis C 2006 Trust and Privacy in Digital Business: Third International Conference, TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings. Springer 4083
Fischer-Hübner S, Furnell S & Lambrinoudakis C 2006 Trust, Privacy, and Security in Digital Business. LNCS 4083, Springer
Dimopoulos V & Furnell S 2005 A protection profiles approach to risk analysis for small and medium enterprises.
Furnell SM 2005 Computer Insecurity: Risking the System. Springer.
Dowland P, Furnell S, Thuraisingham B & Wang XS 2005 Security Management, Integrity, and Internal Control in Information Systems. Springer
Dowland P, Furnell S, Thuraisingham B & Wang XS 2005 Security Management, Integrity, and Internal Control in Information Systems: IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference. Springer 193
Furnell SM & Filmore PR 2004 Advances in Network and Communications Engineering. University of Plymouth
Furnell S 2004 Papers from the Four International Network Conference (INC 2004)-6-9 July 2004 Plymouth, UK. Emerald Group Pub.
Furnell SM 2001 Cybercrime: Vandalizing the Information Society.
Chapters
Furnell SM 2010 'Hackers, viruses and malicious software' in Jewkes Y; Yar M Handbook of Internet Crime Willan Pub 173-193
Magklaras G & Furnell S 2010 'Insider Threat Specification as a Threat Mitigation Technique' in Probst CW Insider Threats in Cyber Security Springer-Verlag New York Inc 219-242
Furnell SM 2009 'Securing the Human Factor' in Cofta P; Lacohée H; Phippen A; Furnell S Understanding Public Perceptions: Trust and Engagement in ICT-Mediated Services Intl Engineering Consortium 171-190
Furnell SM 2009 'Cybercrime in Society' in Wheeler S Connected minds, emerging cultures Information Age Pub Inc 209-224
Furnell SM 2008 'Security usability challenges for end-users' in Gupta M; Sharman R Social and Human Elements of Information Security Information Science Publishing 196-219
Dowland P & Furnell SM 2008 'Security Concepts, Services, and Threats' in Furnell S; Katsikas SK; Lopez J; Patel A Securing information and communications systems Artech House Publishers 5-20
Clarke NL, Dowland P & Furnell SM 2008 'User Authentication Technologies' in Furnell S; Katsikas SK; Lopez J; Patel A Securing information and communications systems Artech House Publishers 35-59
Furnell S & Ward J 2008 'Malware' Security and Software for Cybercafes IGI Global 147-169 , DOI
Furnell S 2007 'Wireless Security'
Furnell SM 2006 'E-Commerce Security' in Warkentin M; Vaughn R Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues Idea Group Publishing, Hershey PA 131-149
Furnell SM & Ward J 2006 'Malware: An Evolving Threat' in Kanellis P; Kiountouzis E; Kolokotronis N; Martakos D Digital Crime and Forensic Science in Cyberspace Idea Group Publishing, Hershey PA 28-54
Evans MP & Furnell SM 2005 'A Model for Managing and Migrating Web Resources' in Lloyd L Best Technology Practices in Higher Education. Information Today Inc., New Jersey 177-192
Furnell S 2005 'Attack and Exploitation of Systems' Springer 105-145
Furnell S 2005 'Common Failings That Compromise Security' Springer 41-72
Furnell S 2005 'Insecurity: Here Today, Here Tomorrow?' Springer 179-201
Furnell S 2005 'The Need to Raise Awareness' Springer 17-39
Furnell S 2005 'The Widespread Nature of Vulnerability' Springer 73-103
Furnell SM & Karweni T 2001 'Online Learning and Security' in English S; Nistor N; Wheeler S Towards the Virtual University: International On-Line Learning Perspectives
Davey J, Furnell SM & Gaunt N 2001 'The ISHTAR Security Guidelines' IOS Press; 1999 167-180
Furnell SM, Warren MJ & Evans MP 2001 'The ISHTAR World Wide Web Dissemination and Advisory Service for Healthcare Information Security' IOS Press; 1999 249-280
Sanders P, Furnell S & Warren M 1996 'Baseline Security Guidelines for Health Care System Users' 78-99
Furnell SM & Sanders PW 1996 'The SEISMED guidelines for host systems security' 150-155 Author Site
Furnell S 0 'The Mobile Mismatch: Power Without Protection?' 10-10
Conference Papers
Furnell SM, Alotaibi F & Esmael R 2019 'Aligning Security Practice with Policy: Guiding and Nudging towards Better Behavior' Hawaii International Conference on System Sciences (HICSS) PEARL
Alotaibi S, Alruban A, Furnell S & Clarke N 2019 'A novel behaviour profiling approach to continuous authentication for mobile applications' 246-251
Mori P, Furnell S & Camp O 2019 'Foreword'
Alotibi G, Clarke N, Li F & Furnell S 2018 'The Current Situation of Insider Threats Detection: An Investigative Review' 2018 21st Saudi Computer Society National Computer Conference (NCC) 25/04/2018 26/04/2018 IEEE , DOI
Da Veiga A, Vorster R, Li F, Clarke N & Furnell S 2018 'A comparison of compliance with data privacy requirements in two countries'
Furnell S, K M, Piper F, E C, H C & Ensor C 2018 'A National Certification Programme for Academic Degrees in Cyber Security' Springer International Publishing 133-145 , DOI PEARL
Al-Kawaz H, Clarke N, Furnell S, Li F & Alruban A 2018 'Advanced facial recognition for digital forensics' 11-19
Alruban A, Clarke N, Li F & Furnell S 2018 'Biometrically Linking Document Leakage to the Individuals Responsible' Springer International Publishing 135-149 , DOI
Vasileiou I & Furnell S 2018 'Enhancing security education recognising threshold concepts and other influencing factors' 398-403
Mashhadani S, Al-kawaz H, Clarke N, Furnell S & Li F 2017 'A novel multimedia-forensic analysis tool (M-FAT)' 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST) 11/12/2017 14/12/2017 IEEE , DOI
Alotaibi F, Clarke N & Furnell S 2017 'An analysis of home user security awareness & education' 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST) 11/12/2017 14/12/2017 IEEE , DOI
Alotaibi F, Furnell S, Stengel I & Papadaki M 2017 'Enhancing cyber security awareness with mobile games' 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST) 11/12/2017 14/12/2017 IEEE , DOI
Alqahtani N, Furnell S, Atkinson S & Stengel I 2017 'Internet risks for children: Parents' perceptions and attitudes: An investigative study of the Saudi Context' 2017 Internet Technologies and Applications (ITA) IEEE , DOI PEARL
Alohali M, Clarke N, Furnell S & Albakri S 2017 'Information security behavior: Recognizing the influencers' 2017 Computing Conference 18/07/2017 20/07/2017 IEEE , DOI
Alqahtany S, Clarke N, Furnell S & Reich C 2017 'A forensic acquisition based upon a cluster analysis of non-volatile memory in IaaS' 2017 2nd International Conference on Anti-Cyber Crimes (ICACC) 26/03/2017 27/03/2017 IEEE , DOI
Alruban A, Clarke N, Li F & Furnell S 2017 'Insider Misuse Attribution using Biometrics' the 12th International Conference 29/08/2017 01/09/2017 ACM Press , DOI
Pacella D, Dell’Aquila E, Marocco D & Furnell S 2017 'Toward an Automatic Classification of Negotiation Styles Using Natural Language Processing' Springer International Publishing 339-342 , DOI PEARL
Alotaibi F, Furnell S, Stengel I & Papadaki M 2016 'A survey of cyber-security awareness in Saudi Arabia' 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) 05/12/2016 07/12/2016 IEEE , DOI
Alotaibi M, Furnell S & Clarke N 2016 'Information security policies: A review of challenges and influencing factors' 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) 05/12/2016 07/12/2016 IEEE , DOI
Alotibi G, Clarke N, Fudong Li & Furnell S 2016 'User profiling from network traffic via novel application-level interactions' 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) 05/12/2016 07/12/2016 IEEE , DOI
Furnell S & Shoniregun CA 2016 'Welcome message' 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) 05/12/2016 07/12/2016 IEEE , DOI
Alqahtany S, Clarke N, Furnell S & Reich C 2016 'A Forensic Acquisition and Analysis System for IaaS: Architectural Model and Experiment' 2016 11th International Conference on Availability, Reliability and Security (ARES ) 31/08/2016 02/09/2016 IEEE , DOI
Alruban A, Clarke N, Li F & Furnell S 2016 'Proactive biometric-enabled forensic imprinting' 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security) 13/06/2016 14/06/2016 IEEE , DOI
Camp O, Furnell S & Mori P 2016 'Foreword'
Clarke N, Li F, Furnell S, Stengel I, Ganis G & Ltd AC 2016 'Information Security and Practice: The User's Perspective' 81-89
Sherif E, Furnell S & Clarke N 2015 'Awareness, behaviour and culture: The ABC in cultivating security compliance' 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST) 14/12/2015 16/12/2015 IEEE , DOI
Alotaibi S, Furnell S & Clarke N 2015 'Transparent authentication systems for mobile device security: A review' 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST) 14/12/2015 16/12/2015 IEEE , DOI
Alqahtany S, Clarke N, Furnell S & Reich C 2015 'Cloud Forensics: A Review of Challenges, Solutions and Open Problems' 2015 International Conference on Cloud Computing (ICCC) 26/04/2015 29/04/2015 IEEE , DOI
Al Abdulwahid A, Clarke N, Furnell S, Stengel I & Reich C 2015 'The Current Use of Authentication Technologies: An Investigative Review' 2015 International Conference on Cloud Computing (ICCC) 26/04/2015 29/04/2015 IEEE , DOI
Al Abdulwahid A, Clarke N, Stengel I, Furnell S & Reich C 2015 'A Survey of Continuous and Transparent Multibiometric Authentication Systems' 1-10
Sherif E, Furnell S & Clarke N 2015 'An Identification of Variables Influencing the Establishment of Information Security Culture' Springer International Publishing 436-448 , DOI
Alotibi G, Li F, Clarke N & Furnell S 2015 'Behavioral-Based Feature Abstraction From Network Traffic' 1-9
Furnell SM 2015 'From Passwords to Biometrics: In Pursuit of a Panacea' Springer International Publishing 3-15 , DOI
Al Abdulwahid A, Clarke N, Stengel I, Furnell S & Reich C 2015 'Security, Privacy and Usability – A Survey of Users’ Perceptions and Attitudes' Springer International Publishing 153-168 , DOI
Zaaba ZF, Furnell SM & Dowland PS 2014 'A study on improving security warnings' 2014 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M) 17/11/2014 18/11/2014 IEEE , DOI
Li F, Clarke N, Furnell S & Mkwawa I-H 2014 'Performance evaluation of a Technology Independent Security Gateway for Next Generation Networks' 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) 08/10/2014 10/10/2014 IEEE , DOI
Al Abdulwahid A, Clarke N, Furnell S & Stengel I 2014 'A conceptual model for federated authentication in the cloud' 1-11
Alqahtany S, Clarke N, Furnell S & Reich C 2014 'A forensically-enabled IAAS cloud computing architecture' 75-83 , DOI
Joy D, Li F, Clarke NL & Furnell SM 2014 'A user-oriented network forensic analyser: The design of a high-level protocol analyser' 84-93 , DOI
Alsaiari H, Papadaki M, Dowland PS & Furnell SM 2014 'Alternative graphical authentication for online banking environments' 122-136
Saevanee H, Clarke N, Furnell S & Biscione V 2014 'Text-Based Active Authentication for Mobile Devices' 99-112
Goebert S, Harriehausen-Muehlbauer B, Purnell S & Technol SIS 2014 'Towards A Unified OAI-PMH Registry' 97-100
AlFahdi M, Clarke NL & Furnell SM 2014 'Towards an automated forensic examiner (AFE) based upon criminal profiling &amp; artificial intelligence' 1-9
Mattord H, Levy Y & Furnell S 2013 'Factors of password-based authentication' 1685-1693
Al Fahdi M, Clarke NL & Furnell SM 2013 'Challenges to digital forensics: A survey of researchers &amp; practitioners attitudes and opinions' 2013 Information Security for South Africa 14/08/2013 16/08/2013 IEEE , DOI
Furnell S & Bär N 2013 'Essential lessons still not learned? examining the password practices of end-users and service providers' 217-225 , DOI
Li F, Clarke N, Furnell S, Oscar Fajardo J, Liberal F & Sidibe M 2013 'A TECHNOLOGY INDEPENDENT SECURITY GATEWAY FOR FUTURE EMERGENCY TELECOMMUNICATION SYSTEMS (ETS)' 299-308
Li F, Clarke N & Furnell S 2013 'A Technology Independent Security Gateway for Real-Time Multimedia Communication' Springer Berlin Heidelberg 14-25 , DOI
Heinzle B & Furnell S 2013 'Assessing the Feasibility of Security Metrics' Springer Berlin Heidelberg 149-160 , DOI
Goebert S, Harriehausen-Muehlbauer B, Wentzel C, Purnell S & IS T 2013 'Decentralized Hosting And Preservation Of Open Data' 264-+
Clarke NL, Dowland P, Furnell SM & IEEE 2013 'e-Invigilator: A Biometric-Based Supervision System for e-Assessments' 238-242
Smith A, Papadaki M & Furnell SM 2013 'Improving Awareness of Social Engineering Attacks' Springer Berlin Heidelberg 249-256 , DOI
Furnell S, Clarke N & Katos V 2013 'Preface'
Furnell SM 2013 'Security Education: The Challenge beyond the Classroom' Springer Berlin Heidelberg 32-38 , DOI
Clarke N, Katos V, Menesidou SA, Ghita B & Furnell S 2012 'A novel security architecture for a space-data DTN' Springer Berlin/Heidelberg 342-349
Anuar N, Papadaki M, Furnell S & Clarke N 2012 'A Response Strategy Model for Intrusion Response Systems' Springer Boston 573-578
Krey M, Furnell S, Harriehausen B & Knoll M 2012 'Approach to the Evaluation of a Method for the Adoption of Information Technology Governance, Risk Management and Compliance in the Swiss Hospital Environment' 2810-2819
Saevanee H, Clarke N & Furnell S 2012 'Multi-modal Behavioural Biometric Authentication for Mobile Devices' Springer Boston 465-474
Clarke N & Furnell S 2012 'Preface'
Krey M, Furnell S, Harriehausen B & Knoll M 2012 'STRUCTURED APPROACH TO THE ADOPTION OF INFORMATION TECHNOLOGY GOVERNANCE, RISK AND COMPLIANCE IN HOSPITALS USING DESIGN SCIENCE PRINCIPLES' 85-96
Zaaba ZF, Furnell SM & Dowland PS 2011 'End-user perception and usability of information security' 97-107
Jali MZ, Furnell SM & Dowland PS 2011 'Multifactor graphical passwords: An assessment of end-user performance' 7-12
Furnell S & Clarke N 2011 'Preface'
Jali M, Furnell S & Dowland P 2011 'Quantifying the Effect of Graphical Password Guidelines for Better Security' 80-91
Saevanee H, Clarke N & Furnell S 2011 'SMS linguistic profiling authentication on mobile device' 224-228
Krey M, Harriehausen B, Knoll M & Furnell S 2010 'IT governance and its spread in Swiss hospitals' 52-60
Talib S, Clarke NL, Furnell SM & IEEE 2010 'An Analysis of Information Security Awareness within Home and Work Environments' 196-203 , DOI
Talib S, Clarke NL, Furnell SM & IEEE 2010 'An Analysis of Information Security Awareness within Home and Work Environments' 196-203
Jali MZ, Furnell SM & Dowland PS 2010 'Assessing image-based authentication techniques in a web-based environment' Emerald Group Publishing Limited 43-53
Ibrahim T, Furnell SM, Papadaki M & Clarke NL 2010 'Assessing the Usability of End-User Security Software' 177-189
Sanders BG, Dowland PS & Furnell SM 2010 'Implications and Risks of MMORPG Addiction: Motivations, Emotional Investment, Problematic Usage and Personal Privacy' 61-73
Tjhai GC, Papadaki M, Furnell SM & Clarke NL 2010 'Investigating the problem of IDS false alarms: An experimental study using Snort' 253-267
Krey M, Harriehausen B, Knoll M & Furnell S 2010 'IT Governance and its impact on the Swiss Healthcare' 340-345
Sanders BG, Chen V, Zahra D, Dowland P, Atkinson S, Papadaki M & Furnell S 2010 'Online addiction: privacy risks in online gaming environments' Chbeir R ACM 114-121 Publisher Site
Clarke N, Furnell S & Von Solms R 2010 'Preface'
Rimbach F, Bleimann U & Furnell S 2010 'Psycho-Analytical Considerations in Internet Marketing - Focusing on Human Needs and Personal Trust' 345-354
Newbould M & Furnell S 2009 'Playing safe: A prototype game for raising awareness of social engineering' 24-30
Sanders BG, Dowland PS & Furnell S 2009 'An Assessment of People’s Vulnerabilities in Relation to Personal and Sensitive Data' Lulu. com 50-50
Szewczyk P & Furnell S 2009 'Assessing the online security awareness of Australian Internet users' Information Institute Publishing
Ibrahim T, Furnell S, Papadaki M & Clarke N 2009 'Assessing the Usability of Personal Internet Security Tools' 102-111
Zhao D, Furnell SM, Al-Ayed A & IEEE 2009 'Automated Precautionary Measures for Managing System Security Vulnerabilities' 408-+
Zhao D, Furnell SM & Al-Ayed A 2009 'Automated Precautionary Measures for Managing System Security Vulnerabilities' 1-5
Atkinson S, Furnell SM & Phippen AD 2009 'E-Safety and E-Security: Raising security awareness among young people using peer education' 15-17
Jali MZ, Furnell S & Dowland PS 2009 'Evaluating Web-Based User Authentication using Graphical Techniques' Lulu. com 108-108
Fischer-Hubner S, Furnell S & Lambrinoudakis C 2009 'Exploring Trust, Security and Privacy in Digital Business' 191-210
Clarke N, Karatzouni S & Furnell S 2009 'Flexible and Transparent User Authentication for Mobile Devices' 1-12
Furnell S & Clarke N 2009 'Preface'
Atkinson S, Furnell S & Phippen AD 2009 'Risk Culture Influences in Internet Safety and Security' Lulu. com 61-61
Zhao D, Furnell SM & Al-Ayed A 2009 'The Research on a Patch Management System for Enterprise Vulnerability Update' 250-+ , DOI
Helala M, Furnell SM & Papadaki M 2008 'Evaluating the usability impacts of security interface adjustments in Word 2007' 48-55
Bakhshi T, Papadaki M & Furnell S 2008 'A Practical Assessment of Social Engineering Vulnerabilities' Lulu. com 12-23
Ibrahim T, Furnell SM, Papadaki M & Clarke NL 2008 'Assessing the Challenges of Intrusion Detection Systems'
Wareham A & Furnell S 2008 'Electronic Activism: Threats, Implications and Responses' 211-217
Helala M, Furnell SM & Papadaki M 2008 'Evaluating the usability impacts of security interface adjustments in Word 2007' 50-50
Tjhai GC, Papadaki M, Furnell SM & Clarke NL 2008 'Investigating the problem of IDS false alarms: An experimental study using Snort' Springer 253-267
Ghita B & Furnell S 2008 'Neural network estimation of TCP performance' 53-58 , DOI
Clarke N & Furnell S 2008 'Preface'
Furnell S 2008 'Preface'
Tjhai GC, Papadaki M, Furnell SM & Clarke NL 2008 'The problem of false alarms: Evaluation with Snort and DARPA 1999 dataset' 139-+
FURNELL SM 2008 'Trust, Privacy and Security in Digital Business (Paperback): 5th International Conference, TrustBus 2008 Turin, Italy, September 1-5, 2008, Proceedings Book.(Series: Lecture Notes in Computer Science/Security and Cryptology)'
Karatzouni S, Clarke NL & Furnell SM 2007 'Device-versus network-centric authentication paradigms for mobile devices: Operational and perceptual trade-offs' 117-126
Karatzouni S, Clarke NL & Furnell SM 2007 'Utilising biometrics for transparent user authentication on mobile devices' 549-557
Tucker CJ, Furnell SM, Ghita BV & Brooke PJ 2007 'A new taxonomy for comparing intrusion detection systems' 88-98 , DOI
Furnell SM, Katsabas D, Dowland PS & Reid F 2007 'A practical usability evaluation of security features in end-user applications' 205-216
Furnell S, Katsabas D, Dowland P & Reid F 2007 'A Practical Usability Evaluation of Security Features in End-User Applications' Venter HS; Eloff MM; Labuschagne L; Eloff JHP; Solms RV Springer 205-216 Publisher Site
Razak SA, Furnell SM & Brooke PJ 2007 'A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks' Academic Conferences Limited 271-271
Razak SA, Furnell S, Clarke N & Brooke P 2007 'Building a trusted community for mobile ad hoc networks using friend recommendation' 129-+
Karatzouni S, Clarke NL & Furnell SM 2007 'Device-versus Network-Centric Authentication Paradigms for Mobile Devices' School of Computer and Information Science, Edith Cowan University, Perth, Western Australia
Karatzouni S, Furnell SM, Clarke NL & Botha RA 2007 'Perceptions of user authentication on mobile devices' 11-13
Fischer K-P, Bleimann U & Furnell S 2007 'Pre-execution security policy assessment of remotely defined BPEL-Based Grid processes' 178-+
Furnell S & Clarke N 2007 'Preface'
Furnell S & Clarke N 2007 'Proceedings of the International Symposium on Human Aspects of Information Security and Assurance (HAISA 2007)' University of Plymouth, School Of Computing, Communications And Electronics
Fischer KP, Bleimann U, Fuhrmann W & Furnell SM 2007 'Security policy enforcement in BPEL-defined collaborative business processes' 685-694
Dimopoulos V & Furnell S 2006 'A protection profiles approach to risk analysis for small and medium enterprises' 267-283
Furnell S, Jusoh A, Katsabas D & Dowland P 2006 'Considering the Usability of End-User Security Software' Fischer-Hübner S; Rannenberg K; Yngström L; Lindskog S Springer 307-316 Publisher Site
Furnell S, Jusoh A, Katsabas D & Dowland P 2006 'Considering the usability of end-user security software' 307-316
Rimbach F, Dannenberg M, Bleimann U & Furnell SM 2006 'From page ranking to topic sensitive page ranking: Implementation and impact' 27-34
Razak SA, Furnell S, Clarke N & Brooke P 2006 'Part II-Short Papers-Infrastructure Protection and Cyber Security-A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks–A Friend Approach' Berlin: Springer-Verlag, 1973- 590-595
Furnell S 2006 'Preface'
Furnell SM & Dowland PS 2006 'Proceedings of the 6th International Network Conference (INC 2006)' University of Plymouth
Furnell S 2005 'Fostering the usability of information security solutions' OECD-APEC Workshop on Security of Information Systems and Networks Seoul 05/12/2005 06/12/2005 Publisher Site
Furnell SM 2005 'Considering the security challenges in consumer-oriented eCommerce' 2005 Ieee International Symposium on Signal Processing and Information Technology (Isspit), Vols 1 and 2 534-539
Furnell SM & IEEE 2005 'Considering the security challenges in consumer-oriented eCommerce' 534-539
Zincir I, Furnell S & Phippen A 2005 'Intrusion detection via behavioural profiling on mobile and wireless networked devices' Euromedia '2005: 11Th Annual Euromedia Conference 67-71
Zincir I, Furnell S & Phippen A 2005 'Intrusion detection via behavioural profiling on mobile and wireless networked devices' 67-71
Charruau D, Furnell S & Dowland P 2005 'ISOneWorld 2005 Conference and Convention, Enabling Executive IS Competencies, Las Vegas, Nevada, USA, 2005 30 March–1 April CD ROM ISBN: 0-9729562-6-3' Elsevier 478-481
Furnell SM, Dowland PS & Kormentzas G 2005 'Proceedings of the 5th International Network Conference (INC 2005)' University of the Aegean & University of Plymouth
Ghita B, Furnell S, Lines B & Ifeachor E 2005 'TCP performance estimation using neural networks modelling'
Singh H, Furnell SM, Dowland PS, Lines B & Kaur S 2004 'A Correlation Framework for Continuous User Authentication Using Data Mining' Proceedings of the Fourth International Network Conference (INC 2004), Plymouth, UK 06/07/2004 09/07/2004 237-245
Schilke SW, Bleimann U, Furnell SM & Phippen AD 2004 'Multi-Dimensional-Personalisation for the online and offline world' Proceedings of the Fourth International Network Conference (INC 2004), Plymouth, UK 06/07/2004 09/07/2004 545-552
Preuss J, Furnell SM & Lea SJ 2004 'The Adoption of Criminal Profiling for Computer Crime' CD-ROM Proceedings of 13th Annual EICAR Conference, Luxembourg 01/05/2004 04/05/2004
Phyo AH & Furnell SM 2004 'A detection-oriented classification of insider it misuse'
Phyo AH, Furnell S & Ifeachor E 2004 'A framework for monitoring insider misuse of IT applications'
Phyo AH, Furnell SM & Portilla F 2004 'A framework for role-based monitoring of insider misuse' 51-65
Phyo AH, Furnell SM & Portilla F 2004 'A framework for role-based monitoring of insider misuse' 51-65 , DOI
Dowland P & Furnell S 2004 'A Long-term Trial of Keystroke Profiling using Digraph, Trigraph and Keyword Latencies' Deswarte Y; Cuppens F; Jajodia S; Wang L Kluwer / Springer 275-290 Publisher Site
Dowland PS & Furnell SM 2004 'A long-term trial of keystroke profiling using digraph, trigraph and keyword latencies' 275-289
Clarke N, Furnell S, Lines B & Reynolds P 2004 'Application of keystroke analysis to mobile text messaging' 14-15
Dimopoulos V, Furnell S, Jennex M & Kritharas I 2004 'Approaches to IT security in small and medium enterprises'
Razak SA, Furnell SM & Brooke PJ 2004 'Attacks against mobile ad hoc networks routing protocols'
Dimopoulos V, Furnell S, Barlow I & Lines B 2004 'Factors affecting the adoption of IT risk analysis'
Schilke SW, Bleimann U, Furnell SM & Phippen AD 2004 'Multi-dimensional-personalisation for location and interest-based recommendation' 379-385 , DOI
Karweni T, Furnell SM & Gaunt N 2004 'Patient consent advisory system' 133-137
Furnell SM & Dowland PS 2004 'Proceedings of the 4th International Network Conference (INC 2004)' University of Plymouth
Land F, Drummond H, Fellman PV, Rodriguez R, Furnell S & Tsiavos P 2004 'The darker side of innovation' 465-466
Magklaras G & Furnell S 2004 'The insider misuse threat survey: investigating IT misuse from legitimate users'
Finch J, Furnell S & Dowland P 2003 'Assessing IT security culture: system administrator and end-user perspectives'
Dimopoulos V, Furnell S & Barlow I 2003 'Considering IT risk analysis in small and medium enterprises' BITS publication
Furnell S 2003 'Cybercrime: Vandalizing the information society' 8-16
Dimopoulos V, Fletcher J & Furnell SM 2003 'Evaluating the reliability of commercially available biometric devices' 166-174
Furnell S, Warren AG & Dowland P 2003 'Improving Security Awareness Through Computer-based Training' Irvine CE; Armstrong HL Kluwer 287-301 Publisher Site
Furnell SM, Warren AG & Dowland PS 2003 'Improving security awareness through computer-based training' 287-301
Furnell S 2003 'Internet Research: Introduction' 78-79
Mued L, Lines B & Furnell S 2003 'Interpolation of packet loss and lip sync error on IP media' Ccct 2003, Vol 5, Proceedings - Computer, Communication and Control Technologies: Ii 249-253
Papadaki M, Furnell S, Lines B & Reynolds P 2003 'Operational characteristics of an automated intrusion response system' 65-75
Papadaki M, Furnell S, Lines B & Reynolds P 2003 'Operational characteristics of an automated intrusion response system' 65-75
Mued L, Lines B, Furnell S & Reynolds P 2003 'The effects of lip synchronization in IP conferencing' 210-213
Clarke NL, Furnell SM, Lines BM & Reynolds PL 2003 'Using keystroke analysis as a mechanism for subscriber authentication on mobile handsets' 97-108
Clarke NL, Furnell SM, Lines BM & Reynolds PL 2003 'Using keystroke analysis as a mechanism for subscriber authentication on mobile handsets' 97-108
Papadaki M, Furnell SM, Lines BM & Reynolds PL 2002 'A Response-Orientated Taxomony of IT System Intrusions' Roccetti M SCS Europe 87-95
Evans M & Furnell S 2002 'A Web-Based Resource Migration Protocol Using WebDAV' Lassner D ACM Press 263-271
Alayed A, Furnell SM & Barlow IM 2002 'Addressing internet security vulnerabilities' Kluwer Academic Publishers 121-132
Alayed A, Furnell SM & Barlow IM 2002 'Addressing internet security vulnerabilities - A Benchmarking study' 121-132
Alayed A, Furnell S & Barlow IM 2002 'Addressing Internet security vulnerabilities - A benchmarking study' Security in the Information Society: Visions and Perspectives 121-132
Clarke NL, Furnell SM, Reynolds PL, Rodwell PM, IEE & IEE 2002 'Advanced subscriber authentication approaches for third generation mobile systems' 319-323
Clarke NL, Furnell SM, Reynolds PL & Rodwell PM 2002 'Advanced subscriber authentication approaches for third generation mobile systems' Third International Conference on 3G Mobile Communication Technologies 319-323
Knahl MH, Bleimann U, Furnell S & Hofmann HD 2002 'An Integrated Network and System Management Framework based on Adapted Software Components' Proceedings of Euromedia 2002 113-118
Clarke NL, Furnell SM & Reynolds PL 2002 'Biometric authentication for mobile devices' 61-69
Furnell S, Alayed A, Barlow IM & Dowland PS 2002 'Critical Awareness - The problem of monitoring security vulnerabilities' Hutchinson B MCIL 85-91
Furnell S 2002 'Cybercrime: Vandalizing the information society' 8-16
Ghita BV, Furnell S, Lines BM & Ifeachor EC 2002 'Endpoint study of Internet paths and web pages transfers' Furnell S; Dowland PS University of Plymouth 261-270
Mued L, Lines BM, Furnell S & Reynolds PL 2002 'Investigating Interaction of Audio and Video Quality as Perceived in Low-Cost Multimedia Conferencing Systems' Furnell S; Dowland PS University of Plymouth 181-189
Dowland P, Furnell S & Papadaki M 2002 'Keystroke Analysis as a Method of Advanced User Authentication and Response' Ghonaimy A; El-Hadidi MT; Aslan HK Kluwer 215-226 Publisher Site
Furnell SM & Dowland PS 2002 'Proceedings of the Third International Network Conference'
Clarke NL, Furnell S, Lines BM & Reynolds PL 2002 'Subscriber Authentication for Mobile Phones through the Implementation of Keystroke Dynamics' Furnell S; Dowland PS University of Plymouth 347-355
Clarke N, Furnell S, Lines B & Reynolds P 2002 'Subscriber authentication for mobile phones using keystroke dynamics' 16-18
Evans M & Furnell S 2002 'WebRUM: A Model for Measuring Web-Wide Resource Usage' Furnell S; Dowland PS University of Plymouth 11-21
Singh H, Furnell S, Lines B & Dowland P 2001 'Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining' Gorodetski VI; Skormin VA; Popyack LJ Springer 153-158 Publisher Site
Singh H, Furnell S, Lines B & Dowland P 2001 'Investigating and evaluating behavioural profiling and intrusion detection using data mining' 153-158
Ghita BV, Furnell SM, Lines BM, Le-Foll D & Ifeachor EC 2001 'Network quality of service monitoring for IP telephony' 26-34 , DOI
Papadaki M, Magklaras GB, Furnell SM & Alayed A 2001 'Security and System Intrusions - The need for Automatic Response Frameworks' Eloff JHP; von Solms R; Dhillon G Kluwer Academic Publishers 87-97
Furnell S, Papadaki M, Magklaras G & Alayed A 2001 'Security Vulnerabilities and System Intrusions' Springer 87-97
Furnell S, Papadaki M, Magklaras G & Alayed A 2001 'Security vulnerabilities and system intrusions-the need for automatic response frameworks' 87-98
Furnell SM 2001 'The problem of categorising cybercrime and cybercriminals' 29-36
Ord T & Furnell SM 2000 'User authentication for keypad-based devices using keystroke analysis' 263-272
Furnell S, Gritzalis D, Katsikas S, Mavroudakis K, Sanders P & Warren M 1998 'Methods of responding to healthcare security incidents' Netherlands 1138-1142
Evans MP, Furnell SM, Phippen AD, Reynolds PL & IEE 1998 'Mobility considerations for integrated telecommunications service environments' 101-105
Furnell SM, Illingworth HM, Katsikas SK, Reynolds PL & Sanders PW 1997 'A comprehensive authentication and supervision architecture for networked multimedia systems' 227-238
Furnell S, Sanders P & Warren M 1997 'Addressing information security training and awareness within the European healthcare community' Netherlands 707-711
Furnell SM, Sanders PW & Warren MJ 1997 'Addressing the problem of data security in healthcare information systems' 55-62
Furnell SM, Salmons NJ, Sanders PW, Stockel CT & Warren MJ 1997 'Approaches to security in healthcare multimedia systems' 25-36
Evans MP, Kettunen KT, Blackwell GK, Furnell SM, Phippen AD, Hope S & Reynolds PL 1997 'Network Resource Adaptation in the DOLMEN Service Machine' 25-34
Warren MJ, Furnell SM & Sanders PW 1997 'ODESSA: a new approach to healthcare risk analysis' 391-402
Furnell SM, Morrissey JP, Sanders PW & Stockel CT 1996 'Applications of keystroke analysis for improved login security and continuous user authentication' 283-294
Sanders P, Furnell S & Warren M 1996 'Baseline security guidelines for health care IT and security personnel' 189-234
Sanders P, Furnell S & Warren M 1996 'Baseline security guidelines for health care management' 82-107
Furnell S, Sanders P & Warren M 1996 'Provision of healthcare security information services using the World-Wide Web' 98-102
Furnell SM & Sanders PW 1995 'Security management in the healthcare environment' Netherlands 675-678
Salmons NJ, Furnell SM, Sanders PW & Stockel CT 1995 'Simulation of a Multimedia Patient Records System' SOCIETY FOR COMPUTER SIMULATION, ETC 672-676
Furnell SM, Sanders PW & Stockel CT 1995 'The Use of Simulation in Computer-Based Security Systems' SOCIETY FOR COMPUTER SIMULATION, ETC 779-783
Tucker C, Furnell SM, Ghita BV & Brooke PJ 0 'A New Taxonomy for Intrusion Detection' Proceedings of the Sixth International Network Conference (INC2006), Plymouth, UK 11/07/2006 14/07/2006 253-260
Salama E, Ghita BV & Furnell SM 0 'HTTP-Aware Anonymisation of Packet Traces' Proceedings of the First International Conference on Internet Technologies and Applications, Wrexham, UK 07/09/2005 09/09/2005 421-431
Dimopoulos V, Fletcher J & Furnell SM 0 'Evaluating the reliability of commercially available biometric devices' Proceedings of Euromedia 2003, Plymouth, UK 14/04/2003 16/04/2003 166-174
Zincir I, Furnell S & Phippen A 0 'Behavioural Profiling for Impostor Detection in Mobile Networks' 334-342
Krey M, Furnell S, Harriehausen B & Knoll M 0 'Method Engineering Approach to the Adoption of Information Technology Governance, Risk and Compliance in Swiss Hospitals' Academic Conferences Limited 408-408
Liljeberg M, Raatikainen K, Evans M, Furnell S, Maumon N, Veldkamp E, Wind B & Trigila S 0 'Using CORBA to support terminal mobility' TINA '97 - Global Convergence of Telecommunications and Distributed Object Computing IEEE Comput. Soc , DOI
Reports
Atkinson S, Furnell S & Phippen A 2009 Investigating attitudes towards online safety and security, and evaluating a peer-led Internet safety programme for 14–to 16-year-olds: final report. British Educational Communications and Technology Agency (BECTA)
Clarke NL, Furnell SM & Karatzouni S 0 Applicable Authentication Methods for Mobile Devices and Services.
Clarke NL, Furnell SM & Karatzouni S 0 Design Specification (Architectural & Operational Design).
Other Publications
Lecomte J, Clarke N & Furnell S 0 Artifical Impostor Profiling for Keystroke Analysis on a Mobile Handset. 0 0
Bakar UAA, Furnell SM, Papadaki M & Pinkney G 0 Attack Pattern Analysis: Trends in Malware Variant Development. Lulu. com 0 0 90-90
Zekri L & Furnell SM 0 Authentication based upon secret knowledge and its resilience to impostors. Lulu. com 0 0 30-30
Tope SW, Furnell SM, Papadaki M & Pinkney G 0 Changing Trends in Vulnerability Discovery. Lulu. com 0 0 193-193
EVANS M, FURNELL S, PHIPPEN A, REYNOLDS P, HAMMAC J, KELLIHER J & others 0 DATA COMMUNICATIONS. 0 0
Evans M, Furnell S, Phippen A, Reynolds P, Hammac J & Kelliher J 0 DATA COMMUNICATIONS. 0 0
Furnell SM 0 Data security in European healthcare information systems. 0 0
Karatzouni S, Clarke NL & Furnell SM 0 Device versus network-centric authentication models for mobile devices–operational and perceptual trade-offs. Lulu. com 0 0 23-23
Furnell SM & Other AN 0 Guide for preparing TEMU2005 papers for publication. 0 0
Bryant P, Furnell SM & Phippen AD 0 Improving protection and security awareness amongst home users. Lulu. com 0 0 182-182
Evans MP, Furnell SM, Phippen AD, Reynolds PL, Hammac J, Kelliher J & others 0 Mobile handset with browser application to be used to recognize textual presentation. Google Patents 0 0
Evans MP, Furnell SM, Phippen AD, Reynolds PL, Hammac J & Kelliher J 0 Mobile handset with browser application to be used to recognize textual presentation. Google Patents 0 0
Diehl A, Fuhrmann W, Bleimann U, Reynolds P & Furnell SM 0 New Architecture for a Centralized Next Generation Profile Register in Future Mobile Telecommunication Networks. Lulu. com 0 0 215-215
Evangelatos K & Furnell SM 0 Public awareness of biometrics. Lulu. com 0 0 51-51
Chatziapostolou D & Furnell SM 0 Recording end-users security events: A step towards increasing usability. Lulu. com 0 0 11-11
Jusoh A, Furnell SM & Katsabas D 0 Security Usability: A Survey of End-Users. Lulu. com 0 0 3-3
Fischer KP, Bleimann U, Fuhrmann W & Furnell SM 0 Security-relevance of semantic patterns in cross-organisational business processes using WS-BPEL. Lulu. com 0 0 67-67
Chelleth JV, Furnell SM, Papadaki M & others 0 Social Engineering: A growing threat, with diverging directions. Lulu. com 0 0 179-179
Tjhai GC & Furnell SM 0 Strengthening the Human Firewall. Lulu. com 0 0 222-222
Edmonds BJ & Furnell SM 0 User Awareness of Biometrics. Lulu. com 0 0 30-30
Karakasiliotis A, Furnell SM & Papadaki M 0 User security awareness of social engineering and phishing. Lulu. com 0 0 191-191
Quaden T, Furnell SM, Papadaki M & Pinkney G 0 Uses and dangers of peer-to-peer and instant messaging in a business environment. Lulu. com 0 0 203-203

Reports & invited lectures

Invited Lectures, Panels and Keynotes

  • “Taming Security Technology”, Keynote speaker, 12th International Conference for Internet Technology and Secured Transactions (ICITST-2017), Cambridge, UK, 12 December 2017.
  • “Careering towards a secure future?”, IISP Cyber Career Development Event, Edinburgh, 23 November 2017.
  • “Usability of security”, invited speaker, CriM 2017 Cyber Security seminar and workshops), Oulu, Finland, 8 November 2017.
  • “Build it and they will come? Questioning our provision of security technologies”, invited opening talk, Security and Protection of Information 2017 (SPI 2017), Brno, Czech Republic, 1 June 2017.
  • “Vulnerable and Exploitable - A Patchy approach to security?”, Closing Keynote, BCS Configuration Management Specialist Group Annual Conference, London, 9 May 2017.
  • “Enhancing Passwords: Life support for cybersecurity’s walking dead”, invited talk, Security Forum 2017, Hagenberg, Austria, 5 April 2017.
  • “Not quite dead yet: password authentication revisited”, Panel discussion, 50th Hawaii International Conference on System Sciences (HICSS-50), Hilton Waikoloa Village, Hawaii, 5 January 2017
  • “Careering towards a secure future?”, IISP Cyber Career Development Event, London, 25 November 2016.
  • “Usable Security: Getting better by design?”, Keynote speaker, Sixteenth International Crisis Management Workshop (CriM’16), Oulu, Finland, 2 November 2016.
  • “BYOD: Their Device, Your Problem?”, Mobile Working and Device Management in the Public Sector Conference, Salford, UK, 1 November 2016.
  • “Vulnerability management: Not a patch on where we should be?”, Invited talk, Lancaster University, 30 June 2016.
  • “Mobile device security: Providing protection where the user meets the network”, invited talk, 2016 European Future of Wireless Technology Workshop, Stockholm, Sweden, 14 June 2016.
  • “User Authentication – Knowing, Having and Being”, Guest lecture, University of Piraeus, Greece, 16 May 2016. 
  • “The First 72 Hours - Dealing with the Crucial Time in Incident Response”, Invited panellist, InfoSecurity Magazine Webinar, 28 April 2016.
  • “Addressing the Security Challenges Presented by Mobile Technology”, Keynote Presentation, Realising the Benefits of Mobile Technology and Learning in Higher and Further Education Forum, London, UK, 14 April 2016.
  • “Cybersecurity – What’s in a name?”, Panel Chair, 15th Annual Security Conference, Las Vegas, 29 March 2016.
  • “Why are we so emotional in security?!”, invited panel chair, CRESTCon and IISP Congress 2016, Royal College of Surgeons, London, 10 March 2016.
  • “Usable Security”, Guest lecture, University of Kent, 26 January 2016.
  • “Assessing current & future threats“, Invited Discussant, CERRE Expert Workshop – Cybersecurity: Safeguarding Europe’s Essential Infrastructure, Brussels, Belgium, 19 November 2015.
  • “Securing the i-Society”, Keynote presentation, IEEE i-Society 2015, London, UK, 9 November 2015.
  • Invited event chair, 5th Annual Payments Conference 2015, London, UK, 22 October 2015.
  • “Educating Towards Cyber Security Professionalism”, Invited speaker, 4th International Conference on Cyber Security and Education, Alloa, Scotland, 16 October 2015.
  • “Controlling Privacy – User expectations versus usability”, Invited speaker, CriM15 / Oulu Winter School, Oulu, Finland, 13 October 2015.
  • “How to Articulate Risk to Senior Management”, Invited panelist, InfoSecurity Magazine Fall Virtual Conference - North America, 30 September 2015.
  • “Mobile devices, immobile security?”, Keynote presentation, 9th International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST 2015), Cambridge, UK, 10 September 2015.
  • “Addressing the Security Risks of Negligent Insiders”, Invited panellist, InfoSecurity Magazine Webinar, 31 July 2015.
  • “Mobile Device Security – Whose Device? Whose Data? Whose Problem?”, Special Keynote Presentation, Maximising Mobile Technology and Learning Forum, London, UK, 8 July 2015. 
  • “Creating a Company-Wide Information Security Culture”, Invited panellist, InfoSecurity Magazine Webinar, 19 June 2015.
  • “Getting the measure of cybercrime?”, invited talk, University of Oxford, 5 June 2015.
  • “Building national cybersecurity workforces”, invited panellist, 9th IFIP WG 11.8 World Conference (WISE 9). Hamburg, Germany, 26 May 2015.
  • “Security and Privacy – All under control?”, Guest talk, 14th Annual Security Conference, Las Vegas, 19 May 2015.
  • “Examining the Security Experience”, invited talk, Birmingham City University, Birmingham, UK, 7 May 2015.
  • “Biometric Authentication: Feasibility and Fallout”, invited talk, PAY-SEC Payment Security Summit, London, UK, 21 April 2015.
  • “Mobile biometrics: Who you are, wherever you go”, invited talk, European Biometrics Symposium, Teddington, UK, 25 February 2015.
  • “From Passwords to Biometrics: In Pursuit of a Panacea”, Keynote Presentation, 1st International Conference on Information Systems Security and Privacy (ICISSP 2015), Angers, France, 9-11 February 2015.
  • “Privacy and Trust in Digital Societies”, Invited panelist, 1st International Conference on Information Systems Security and Privacy (ICISSP 2015), Angers, France, 9-11 February 2015.
  • “Spotlight on mobile technology: Utilising and integrating to improve teaching and learning”, Invited panellist, Bett 2015, London, UK, 22 January 2015.
  • “Safeguarding Devices and Data - Reinforcing the Need for Security In Mobile Learning”, Special Keynote Presentation, Transforming Further and Higher Education Through Mobile and Technology Enhanced Learning, London, UK, 9 December 2014.
  • “Mobile Security: The Challenge of Liberation”, Keynote Presentation, International Conference for Internet Technology and Secured Transactions (ICITST-2014), London, UK, 8 December 2014.
  • Invited event chair, 4th Annual Payments Conference 2014, London, UK, 6 November 2014.
  • “In Defence of the Password”, invited talk, Public Research Centre Henri Tudor, Luxembourg, 22 October 2014.
  • “Cyber Security: Can we keep up?”, Guest lecture, European Council of Georgia Study Abroad Program, London, 14 July 2014.
  • Invited event chair, 2nd Annual Omnichannel Banking Conference 2014, London, UK, 19 June 2014.
  • “Ensuring Security within Mobile Learning Strategies: Safeguarding Data and Devices”, invited presentation, Mobile Learning 2014: Transforming the Delivery of Further and Higher Education, London, UK,18 June 2014.
  • “How to develop a strong authentication strategy to enhance security, business performance and user experience”, Invited panellist, Infosecurity Magazine Summer Virtual Conference 2014, 17 June 2014.
  • “Flexible and Non-Intrusive Authentication”, invited presentation, Cloud Computing Security and Identity Workshop National Museum of Computing, Bletchley, UK, 3-4 April 2014.
  • Invited track chair, Technology Innovation Track, The 11th Annual Retail Fraud Conference 2014, London, 2 April 2014.
  • “Ensuring our Digital Security”, invited presentation, Employability for the Digital Age, British Council, Johor Bahru, Malaysia, 26 March 2014.
  • “Bitcoin and other Crypto-currencies – Will they thrive once regulated?”, Panel session, Kaspersky Academy CyberSecurity for the Next Generation – Asia-Pacific and MEA, Seoul, South Korea, 12 March 2014.
  • “Biometrics: A Triumph of Convenience over Security?”, invited presentation, Kaspersky Academy CyberSecurity for the Next Generation – Asia-Pacific and MEA, Seoul, South Korea, 12 March 2014.
  • ”Your Device - Everybody’s Problem?”, HEA Changing the Learning Landscape – Bring your Own Device conference, University of Southampton, 7 March 2014.
  • “Recognising and Responding to Mobile Device Threats”, International Islamic University Malaysia, Kuala Lumpur, 20 February 2014.
  • “Cyber Security: Power to the People?”, IET Devon and Cornwall Cyber Security event, Plymouth University, 29 November 2013.
  • “Convenient to Carry, Difficult to Defend: The Security Challenge of Smartphones and Tablets”, Invited webcast, BrightTALK Application Security Summit, 12 November 2013.
  • “Making Security Tolerable”, University of Malaya, Kuala Lumpur, 1 November 2013.
  • Invited event chair, Payments Conference 2013, London, UK, 30 October 2013.
  • “Are we finally getting past passwords“, Orebro University, Sweden, 15 May 2013.
  • “More than just technology hype: recognising the Big Risk of Big Data”, Panel Chair, Telco Cloud World Forum, London, 17 April 2013.
  • “Vulnerability Management – The Never-Ending Story”, Invited webcast, BrightTALK Application Security Summit, 17 April 2013.
  • “Can we keep up with the Cyber Arms Race?”, Panel session, Kaspersky Lab Asia Pacific & MEA Cup 2013, Singapore, 22 March 2013.
  • “2020 Vision: Enabling and Securing the Enterprise of the Future”, Invited panellist, Infosecurity Webinar, 19 February 2013.
  • “Is Security Awareness a Waste of Time?”, Invited panellist, Infosecurity Webinar, 24 January 2013.
  • “Infosec: Lots of safeguards and no protection?”, Keynote presentation, secau Security Congress, Perth, Western Australia, 5 December 2012.
  • “Delivering OERs to an international audience via iTunes U”, invited presentation, Opening up: New horizons and institutional strategies, London, 4 October 2012.
  • “My mobile device is jailbroken - will you secure it?”, Invited panellist, Infosecurity UK Virtual Conference, 27 September, 2012.
  • “Next-Generation Threats: Old Problems in a New Guise?”, Invited webcast, BrightTALK Next-Generation Threat Protection Summit, 5 September 2012.
  • “iTunes U”, Invited presentation, Apple Executive Briefing Center, London, 24 August 2012.
  • “The Long Shadow of Cyber Crime”, Webinar Panel, Business Tech Debate, Financial Times, London, 16 August 2012.
  • “Cyber Security for SMBs”, Webinar Panel, Kaspersky Lab, London, 28 June 2012.
  • “Mobile Malware:  Finally hitting the moving target?”, Invited webcast, BrightTALK Hackers and Threats Summit, 21 June 2012.
  • Invited event co-chair, Secure Information Conference 2012, London, UK, 15 March 2012.
  • “Phishing deeper: An increasing threat in the evolving Web”, Invited webcast, BrightTALK Web 2.0 Security Summit, 8 February 2012.
  • “New Approaches to New Dangers”, Panel session, Kaspersky Lab US Cup 2011, New York, United States, 10 November 2011.
  • “21st Century Threats Facing End-Users”, Keynote presentation, Information Security South Africa (ISSA) 2011, Johannesburg, South Africa, 15 August 2011.
  • “Are We High In The Clouds?”, Panel session, Kaspersky Lab International Cup 2011, Munich, Germany, 15 April 2011.
  • “Beyond Security Awareness: Achieving culture and avoiding fatigue”, Keynote presentation, Security Forum 2011, Hagenberg, Austria, 6 April 2011.
  • “Usable Security: Can it be too easy?”, University of Kent, 22 March 2011.
  • “Single Sign On: Convenience or Risk?”, Invited Online Panel, BrightTALK Web 2.0 Security Summit, 16 March 2011.
  • “Preparing for the future Internet: IT-Security in a connected world”, Panel session, Kaspersky Lab Asia Pacific & MEA Cup 2011, Shah Alam, Selangor, Malaysia, 5 March 2011.
  • “Meeting new demands for user authentication”, Invited webcast, BrightTALK Authentication Summit, 7 October 2010.
  • “Getting tricky: The many faces of social engineering”, Symposium on Security and Cybercrime: Vision and Foresight, Edinburgh, UK, 25 June 2010.
  • “Security and Usability: Where technology meets the people”, Khalifa University of Science, Technology and Research, Sharjah, UAE, 14 June 2010. 
  • “The threat on the net: Attacking technology 
  • and those who need”, Invited Speaker, Critical National Infrastructure Protection Workshop (CNIP2010), Mumbai, India, 15 May 2010.
  • “Online identity and authentication: The varying degree of being me”, Invited webcast, BrightTALK Identity and Access Management Summit, 6 May 2010.
  • “Essential Mobile Data Security: Keeping data safe and accessible for mobile workers”, Invited Speaker, Public Sector Mobile and Flexible Working: Achieving Real Efficiencies, Birmingham, UK, 25 February 2010.
  • “The Irreversible March of Technology”, Invited Speaker, Human Factors in Information Security Conference, London, UK, 23 February 2010.
  • “Securing mobile devices: Concepts, policies and technologies”, Middlesex University, 29 January 2010.
  • “Usability of Security”, University of Piraeus, Greece, 18 December 2009. 
  • “Protecting your network from portable devices”, Invited webcast, BrightTALK Endpoint Security Summit, 8 December 2009.
  • “Are we really Managing the Threat“, Expert Panel, 2009SECAU Security Congress, Perth, Western Australia, 3 December 2009.
  • "Going, going, gone?  The challenges of mobile security", Invited Speaker, International Conference on Information Security and Digital Forensics 2009, City University, London, 8 September 2009. 
  •  “Global Cyber Threats”, Invited seminar, University College London, 22 June 2009.
  • “Protected or Perplexed?  The challenge of usable security”, Invited talk, IT-security for the new generation, Kaspersky Lab, Moscow, 29 April 2009.
  • “Effective Peer Strategies”, Invited speaker, Safeguarding Cyberworld Conference, Plymouth, UK, 10 February 2009.
  • “Enhancing User Authentication for Mobile Devices“, Invited talk, INDIA-SIM 2009, Bangalore, India, 22-23 January 2009.
  • “Social Engineering: Exploiting the Weakest Links”, University of Portsmouth, 16 January 2009.
  • “Web 3.0: Third time lucky for e-Safety and Security”, Invited speaker, South West Grid for Learning eSafety Conferences, Torquay, Bristol and Bournemouth, 25-27 November 2008.
  • “Cybercrime: Hackers, Malware and other online threats”, Keynote Lecture, IT-Speicher, Regensburg, Germany, 24 July 2008.
  • “Securing the end-user: What they know and what they do”, Keynote Lecture, Third International Conference on Usability Engineering, University of Oviedo, Spain, 20 May 2008.
  • “Cybercrime: A Clear and Present Danger”, University of Exeter, 13 May 2008.
  • “Keystroke dynamics: An authentication enhancement for mobile devices”, Gjøvik University College, Gjøvik, Norway, 31 January 2008.
  • “Combating Identity Theft: Recognising contributors to the problem”, Invited speaker, Net Focus UK 2007, Southampton, 2 October 2007.
  • “How Do You Secure Mobile Devices in a World Where Data Leakage is Pervasive”, Invited workshop moderator, Net Focus UK 2007, Southampton, 2 October 2007.
  • “Cybercrime: The continuing threat”, University of Exeter, 18 May 2007.
  • “Are You Even Remotely Secure? The Mobile Device Dilemma”, Keynote Panel presentation, Infosecurity Europe 2007, Olympia, London, 25 April 2007.
  • “Usability Challenge - Why users can’t use security”, Aston University, 1 November 2006.
  • “Managing the security of information assets”, Managing Information Throughout the Organisation Conference, Guernsey, 13 September 2006.
  • Invited panellist, Security Panel. Mobility Summit 2006, London, 4 July 2006.
  • “Protected or confused: Assessing whether end-users can understand and use security”, Invited speaker, End Point Security 2006, London, 28 June 2006.
  •  “Cybercrime and investigation”, University of Exeter, 10 May 2006.
  • “Mitigating the Enemy Within”, Keynote Panel presentation, Infosecurity Europe 2006, Olympia, London, 25 April 2006.
  • “Continuous user identify verification using keystroke analysis”, BCS SGAI Symposium/Colloquium on Intelligence in Security and Forensic Computing, Edinburgh, 3 April 2006.
  • “The Challenge of Usable IT Security”, Keynote presentation, Usability Engineering, University of Oviedo, Spain, 23-24 March 2006.
  • “The way forward – Where to from here?”, Expert Panel, 1st Colloquium for Information Systems Security Education – Asia Pacific, Adelaide, Australia, 22 November 2005.
  • “Hitting easy targets: The Internet threats facing end-users”, University of Malaga, Spain, 28 October 2005.
  • “Internet insecurity: Who's trying to spoil your day today?”, Keynote presentation at ITA 2005 - International conference on Internet Technologies and Applications, Wrexham, North Wales, 8 September 2005.
  • “Fostering the usability of information security solutions“, APEC-OECD Workshop on the Security of Information Systems and Networks, Seoul, Korea, 6 September 2005.
  • “Educating And Raising Awareness Of Governance Company Wide”, Keynote Panel, Infosecurity Europe 2005, Olympia, London, 26 April 2005.
  • “Get patched or get punched: Plugging the security holes before the attackers hit you”, British Computer Society (Northampton Branch), 8 March 2005.
  • “The requirements and challenges of automated intrusion response”, University of Birmingham, 20 January 2005.
  • “Enemies within?: Managing the problem of insider attacks and misuse”, Keynote presentation at InfoSec 2004, Fremantle, Western Australia, 26th November 2004.
  • “Cyber Parasites: The ongoing march of malware”, Australian Institute of Professional Intelligence Officers, Perth, Western Australia, 19th November 2004.
  • “Malware Evolution: The arrival of the true computer parasite?”, University of Wales, Wrexham, 3 November 2004.
  • “Biometric user authentication using keystroke dynamics”, University of Bristol, 2 November 2004.
  •  “Cyber Threats: What are the issues and who sets the agenda?”, 5th International Relations Conference, The Hague, The Netherlands, 9-11 September 2004.
  • “The Darker Side of Innovation”, Expert Panel, 7th Working Conference on IT Innovation for Adaptability and Competitiveness, Leixlip, Ireland, 30 May-2 June 2004.
  • “E-commerce Security: Getting Consumers to Trust the Net”, Keynote Presentation, IV Jornadas Internacionales sobre comercio electronico, Oviedo, Spain, 25-27 November 2003.
  • “Cybercrime”, Keynote Presentation, International Conference on Web Engineering (ICWE'03), Oviedo, Spain, 16-18 July 2003.
  • “Insider IT Misuse”, Interpol IT Crime Forum, The Hague, 21 May 2003.
  • “Cybercrime”, Faculty Research Seminar, Middlesex University, 26 March 2003.
  • “Cybercrime: Vandalising the Information Society”, Research Seminar, Kingston University, 12 March 2003.
  • “Cybercrime Expert Panel”, SecurIT Summit, Montreux, Switzerland, 19-21 October 2002. 
  • “Security requirements for online distance learning”, ELATnet modules for multimedia netbased teaching International Workshop, Munich, Germany, 18-20 September 2002.
  • “Mobile Security Biometrics”, Global Information Society Forum.31, Tokyo, Japan, 23 May 2002.
  • “Cybercrime: Vandalising the Information Society”, Guest lecture, Middlesex University, 23 April 2002.
  • “User Authentication Methods for Mobile Systems”, Managing the Mobile Workforce, The Open Group Conference, Paris, France, 9 April 2002.
  • “Network Research at the University of Plymouth”, Port Elizabeth Technikon, South Africa, 7 November 2001.
  • “Security issues in Online Distance Learning”, JCALT Workshop on Security in Virtual Learning Environments, South Bank University, UK. 23 October 2000.
  • "E-commerce: Consumer security fears and expectations", British Computer Society – South West Branch, University of Plymouth, UK. 11 April 2000.
  • “Realising Security Policy within the Healthcare Environment”, University of Cambridge, UK.  3 December 1998.
  • “Computer Abuse: Vandalising the Information Society”, British Computer Society – South West Branch, University of Plymouth, UK. 21 January 1997.

Invited participation in short courses

  • Twentieth European Intensive Programme on Information & Communications Security (IPICS 2017), Ionian University, Corfu, Greece, June 2017.
  • Nineteenth European Intensive Programme on Information & Communications Security (IPICS 2016), Catholic University of Leuven, Belgium, July 2016.
  • Eighteenth European Intensive Programme on Information & Communications Security (IPICS 2015), University of the Aegean, Lesbos, Greece, July 2015.
  • Seventeenth European Intensive Programme on Information & Communications Security (IPICS 2014), University of the Aegean, Mytilene, Greece, July 2014.
  • Sixteenth European Intensive Programme on Information & Communications Security (IPICS 2013), University of the Aegean, Samos, Greece July 2013.
  • Fifteenth European Intensive Programme on Information & Communications Security (IPICS 2012), Technical University of Vienna, Austria, September 2012.
  • Fourteenth European Intensive Programme on Information & Communications Security (IPICS 2011), Ionian University, Corfu, Greece, August 2011.
  • Thirteenth European Intensive Programme on Information & Communications Security (IPICS 10), University of the Aegean, Samos, Greece, July 2010.
  • Twelfth European Intensive Programme on Information & Communications Security (IPICS 09), Technical University of Vienna, Austria, July 2009.
  • Eleventh European Intensive Programme on Information & Communications Security (IPICS 08), University of Regensburg, Germany, July 2008.
  • European Intensive Programme on Information & Communication Technologies Security (IPICS ‘2008) – Ninth Winter School, Rovaniemi, Finland, March 2008.
  • Tenth European Intensive Programme on Information & Communications Security (IPICS 07), University of Glamorgan, Wales, July 2007.
  • Eighth European Intensive Programme on Information & Communications Security (IPICS 05), Chios, Greece, July 2005.
  • European Intensive Programme on Information & Communication Technologies Security (IPICS ‘2005) – Sixth Winter School, Oulu, Finland, 30 March-7 April 2005.
  • Seventh European Intensive Programme on Information & Communications Security (IPICS 04), Graz, Austria, July 2004.
  • European Intensive Programme on Information & Communication Technologies Security (IPICS ‘2004) – Fifth Winter School, Oulu, Finland, 30 March-7 April 2004.
  • Sixth European Intensive Programme on Information & Communications Security (IPICS 03), Malaga, Spain, July 2003.
  • European Intensive Programme on Information & Communication Technologies Security (IPICS ‘2003) – Fourth Winter School, Oulu, Finland, 8-16 April 2003.
  • Fifth European Intensive Programme on Information & Communications Security (IPICS 2002), Samos, Greece, 8-19 July 2002.
  • Fourth European Intensive Programme on Information & Communications Security (IPICS 2001), Samos, Greece, 20-31 August 2001.
  • Second European Intensive Programme on Information & Communications Security (IPICS 99), Chios, Greece, 8-20 August 1999.
  • Guidelines for the Security of Health Information, AIM SEISMED Project - Security Course, Thessaloniki, Greece, 26-30 September 1994.

 

Links

For further details please visit my research centre pages .