Research Student Profile

Home People Profile...

Dr Steven M Furnell PhD

Brief biographical information

sfurnell@plymouth.ac.uk

  

Access thesis on-line

Data Security in European Healthcare Information Systems

This thesis considers the current requirements for data security in European healthcare systems and establishments. Information technology is being increasingly used in all areas of healthcare operation, from administration to direct care delivery, with a resulting dependence upon it by healthcare staff. Systems routinely store and communicate a wide variety of potentially sensitive data, much of which may also be critical to patient safety. There is consequently a significant requirement for protection in many cases.




The thesis presents an assessment of healthcare security requirements at the European level, with a critical examination of how the issue has been addressed to date in operational systems. It is recognised that many systems were originally implemented without security needs being properly addressed, with a consequence that protection is often weak and inconsistent between establishments. The overall aim of the research has been to determine appropriate means by which security may be added or enhanced in these cases.




The realisation of this objective has included the development of a common baseline standard for security in healthcare systems and environments. The underlying guidelines in this approach cover all of the principal protection issues, from physical and environmental measures to logical system access controls. Further to this, the work has encompassed the development of a new protection methodology by which establishments may determine their additional security requirements (by classifying aspects of their systems, environments and data). Both the guidelines and the methodology represent work submitted to the Commission of European Communities SEISMED (Secure Environment for Information Systems in MEDicine) project, with which the research programme was closely linked.




The thesis also establishes that healthcare systems can present significant targets for both internal and external abuse, highlighting a requirement for improved logical controls. However, it is also shown that the issues of easy integration and convenience are of paramount importance if security is to be accepted and viable in practice. Unfortunately, many traditional methods do not offer these advantages, necessitating the need for a different approach.




To this end, the conceptual design for a new intrusion monitoring system was developed, combining the key aspects of authentication and auditing into an advanced framework for real-time user supervision. A principal feature of the approach is the use of behaviour profiles, against which user activities may be continuously compared to determine potential system intrusions and anomalous events.




The effectiveness of real-time monitoring was evaluated in an experimental study of keystroke analysis - a behavioural biometric technique that allows an assessment of user identity from their typing style. This technique was found to have significant potential for discriminating between impostors and legitimate users and was subsequently incorporated into a fully functional security system, which demonstrated further aspects of the conceptual design and showed how transparent supervision could be realised in practice.




The thesis also examines how the intrusion monitoring concept may be integrated into a wider security architecture, allowing more comprehensive protection within both the local healthcare establishment and between remote domains.

Dr Steven M Furnell

Director of studies: Prof Peter Sanders
Other supervisors: Dr Colin T. Stockel, Dr Nick Gaunt

Journal papers

Can't get the staff? The growing need for cyber-security skills
Furnell SM, Fischer P, Finch A
Computer Fraud & Security, Volume 2017, Issue 2, February 2017, Pages 5-10, 2017
More details | External link available

AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection
Feizollah A, Anuar NB, Salleh R, Suarez-Tangil G, Furnell SM
Computers & Security, Volume 65, Pages 121-134, 2017
More details | External link available

Evaluating the effect of guidance and feedback upon password compliance
Furnell SM, Esmael R
Computer Fraud & Security, Volume 2017, Issue 1, January, Pages 5-10, 2017
More details | External link available

Leveraging Biometrics for Insider Misuse Identification
Alruban A, Clarke NL, Li F, Furnell SM
International Journal on Cyber Situational Awareness (IJCSA), Vol. 1, No. 1, 2016, article 7, 2016
More details | External link available

The usability of security - revisited
Furnell SM
Computer Fraud & Security, ISSN: 1361-3723, September 2016, pp5-11, 2016
More details

Assessing Staff Acceptance and Compliance with Information Security
Alotaibi T, Furnell SM
International Journal of Computing Academic Research (IJCAR), ISSN 2305-9184, Volume 5, Number 4 (August 2016), pp.195-201, 2016
More details | External link available

A suspect-oriented intelligent and automated computer forensic analysis
Al Fahdi M, Clarke NL, Li F, Furnell SM
Digital Investigation, Volume 18, pp. 65-76, 2016
More details | External link available

Awareness of Mobile Device Security: A Survey of User's Attitudes
Clarke NL, Symes JE, Saevanee H, Furnell SM
International Journal of Mobile Computing and Multimedia Communications (IJMCMC), Vol 7, Iss 1, 2016
More details | External link available

A Novel Taxonomy for Mobile Applications Data
Alotaibi S, Furnell SM, Clarke NL
International Journal of Cyber-Security and Digital Forensics (IJCSDF), ISSN: 2305-0012, Vol. 5, No. 3, pp115-121, 2016
More details | External link available

A Fine-Grained Analysis of User Activity on Mobile Applications: The Sensitivity Level Perception
Alotaibi S, Furnell SM, Clarke NL
International Journal for Information Security Research (IJISR), Volume 5, Issue 3, pp591-599, 2015
More details | External link available

A Conceptual Model for Cultivating an Information Security Culture
Sherif E, Furnell SM
International Journal for Information Security Research (IJISR), Volume 5, Issue 2, pp565-573, 2015
More details | External link available

Secure Graphical One Time Password (GOTPass): An Empirical Study
Alsaiari H, Papadaki M, Dowland PS, Furnell SM
Information Security Journal: A Global Perspective, 24, pp207-220, 2015
More details | External link available

A forensic acquisition and analysis system for IaaS
Alqahtany S, Clarke NL, Furnell SM, Reich C
Cluster Computing, pp1-15, 2015
More details | External link available

Continuous and transparent multimodal authentication: reviewing the state of the art
Al Abdulwahid A, Clarke NL, Stengel I, Furnell SM, Reich C
Cluster Computing, pp1-20, 2015
More details | External link available

Continuous user authentication using multi-modal biometrics
Saevanee H, Clarke NL, Furnell SM, Biscioneb V
Computers & Security, Vol. 53, pp234-246, 2015
More details | External link available

The Price of Patching
Furnell SM, van Niekerk J, Clarke NL
Computer Fraud and Security, Issue 8, pp8-13, 2014
More details | External link available

Factors for Measuring Password-Based Authentication Practices
Mattord HJ, Levy Y, Furnell SM
Journal of Information Privacy and Security, pp71-94, 2014
More details | External link available

D-FICCA: A Density-based Fuzzy Imperialist Competitive Clustering Algorithm for Intrusion Detection in Wireless Sensor Networks
Shamshirband S, Amini A, Anuar NB, Kiah LM, Wah TY, Furnell SM
Measurement, Volume 55, September, pp212–226, 2014
More details | External link available

Investigating the Viability of Multifactor Graphical Passwords for User Authentication
Jali MZ, Furnell SM, Dowland PS
Information Security Journal: A Global Perspective, 00:1–12, ISSN: 1939-3555, Published online: 18 Apr 2014, 2014
More details | External link available

Co-operative user identity verification using an Authentication Aura
Hocking C, Furnell SM, Clarke NL, Reynolds PL
Computers & Security, Volume 39, Part B, November, pp486–502, 2013
More details | External link available

A response selection model for intrusion response systems: Response Strategy Model (RSM)
Anuar NB, Papadaki M, Furnell SM, Clarke NL
Security and Communication Networks, 2013
More details | External link available

Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM)
Anuar NB, Papadaki M, Furnell SM, Clarke NL
Security and Communication Networks, 2012
More details | External link available

Power to the people? The evolving recognition of human aspects of security
Furnell SM, Clarke NL
Computers & Security, Volume 31, Issue 8, pp983–988, 2012
More details | External link available

Authentication Aura - A distributed approach to user authentication
Hocking C, Furnell SM, Clarke NL, Reynolds PL
Journal of Information Assurance and Security, vol. 6 (2011), issue 2, pp149-156, ISSN 1554-1010, 2011
More details | External link available

Massively Multi-Player Online Role Playing Games: What’s the Risk?
Sanders B, Dowland PS, Atkinson S, Furnell SM
Journal of Virtual Worlds Research, vol. 3, no. 3, ISSN: 1941-8477, 2011
More details | External link available

Establishing A Personalized Information Security Culture
Talib S, Clarke NL, Furnell SM
International Journal of Mobile Computing and Multimedia Communications (IJMCMC), Vol 3, Iss 1, pp63-79, 2011
More details | External link available

Comparing Intentions to Use University-Provided vs. Vendor-Provided Multibiometric Authentication in Online Exams
Levy Y, Ramim MM, Furnell SM, Clarke NL
Campus-Wide Information Systems, Vol. 28 Iss: 2, 2011
More details

Online Addiction: A Cultural Comparison of Privacy Risks in Online Gaming Environments
Sanders B, Dowland PS, Atkinson S, Zahra D, Furnell SM, Papadaki M
Journal of Multimedia Processing Technologies, vol. 1, no. 3, September, pp181-193, ISSN: 0976-4127, 2010
More details | External link available

A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm
Tjhai GC, Furnell SM, Papadaki M, Clarke NL
Computers & Security, Volume 29, Issue 6, pp712-723 , 2010
More details | External link available

Assessing image-based authentication techniques in a web-based environment
Jali MZ, Furnell SM, Dowland PS
Information Management & Computer Security, Vol.18, Iss.1, pp43-53, 2010
More details | External link available

Mac security: An Apple that can't be bitten?
Furnell SM
Network Security, Volume 2010, Issue 1, pp7-11, 2010
More details | External link available

Social engineering: assessing vulnerabilities in practice
Bakhshi T, Papadaki M, Furnell SM
Information Management and Computer Security, vol. 17, no. 1, pp53-63, 2009
More details | External link available

From culture to disobedience: Recognising the varying user acceptance of IT security
Furnell SM, Thomson KL
Computer Fraud & Security, Volume 2009, Issue 2, February, pp5-10, 2009
More details | External link available

Scare tactics – A viable weapon in the security war?
Furnell SM, Papadaki M, Thomson KL
Computer Fraud & Security, Volume 2009, Issue 12, December, pp6-10, 2009
More details | External link available

A Friend Mechanism for Mobile Ad Hoc Networks
Razak SA, Samian N, Ma’arof MA, Furnell SM, Clarke NL, Brooke PJ
Journal of Information Assurance and Security, Volume 4, Issue 5, pp440-448, 2009
More details

Securing the next generation: enhancing e-safety awareness among young people
Atkinson S, Furnell SM, Phippen AD
Computer Fraud & Security, Volume 2009, Issue 7, pp13-19 , 2009
More details | External link available

From desktop to mobile: Examining the security experience
Botha RA, Furnell SM, Clarke NL
Computers & Security, Volume 28, Issues 3-4, pp130-137, 2009
More details | External link available

Security beliefs and barriers for novice Internet users
Furnell SM, Tsaganidi V-G, Phippen AD
Computers & Security, Volume 27, Issues 7-8, December, pp235-240 , 2008
More details | External link available

Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks
Razak SA, Furnell SM, Clarke NL, Brooke PJ
Ad Hoc Networks, Volume 6, Issue 7, September, pp1151-1167, 2008
More details | External link available

Who guides the little guy? Exploring security advice and guidance from retailers and ISPs
Furnell SM, Shams R, Phippen AD
Computer Fraud & Security, Volume 2008, Issue 12, December, pp6-10 , 2008
More details | External link available

Self-preservation among online prey
Furnell SM, Ward J
Computer Fraud & Security, Volume 2008, Issue 11, November, pp9-12 , 2008
More details | External link available

It's a jungle out there: Predators, prey and protection in the online wilderness
Furnell SM, Ward J
Computer Fraud & Security, Volume 2008, Issue 10, October, pp3-6 , 2008
More details | External link available

Beyond the PIN: Enhancing user authentication for mobile devices
Furnell SM, Clarke NL, Karatzouni S
Computer Fraud & Security, Volume 2008, Issue 8, pp12-17, 2008
More details | External link available

End-user security culture: A lesson that will never be learnt?
Furnell SM
Computer Fraud & Security, Volume 2008, Issue 4, April, pp6-9, 2008
More details | External link available

Testing our defences or defending our tests: the obstacles to performing security assessment
Furnell SM, Papadaki M
Computer Fraud & Security, Volume 2008, Issue 5, May, pp8-12, 2008
More details | External link available

Identity impairment: The problems facing victims of identity fraud
Furnell SM
Computer Fraud & Security, Volume 2007, Issue 12, December, pp6-11, 2007
More details | External link available

Considering the potential of criminal profiling to combat hacking
Preuss J, Furnell SM, Papadaki M
Journal in Computer Virology, vol. 3, no. 2 pp135-141, 2007
More details | External link available

A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head
Rodwell PM, Furnell SM, Reynolds PL
Computers and Security, Volume 26, Issues 7-8, pp468-478, 2007
More details

Making security usable: Are things improving?
Furnell SM
Computers & Security, Volume 26, Issue 6, pp434-443, 2007
More details

Assessing the security perceptions of personal Internet users
Furnell SM, Bryant P, Phippen AD
Computers & Security, Volume 26, Issue 5, pp410-417, 2007
More details

Phishing: can we spot the signs?
Furnell SM
Computer Fraud & Security, Issue 3, March, pp10-15, 2007
More details

Public awareness and perceptions of biometrics
Furnell SM, Evangelatos K
Computer Fraud & Security, Issue 1, January, pp8-13, 2007
More details

Analysis of security-relevant semantics of BPEL in cross-domain defined business processes
Fischer KP, Bleimann U, Fuhrmann W, Furnell SM
Information Management & Computer Security, Volume 15, Issue 2, pp116-127, 2007
More details

A new taxonomy for comparing intrusion detection systems
Tucker C, Furnell SM, Ghita BV, Brooke PJ
Internet Research, vol. 17, no. 1, pp88-98, 2007
More details

Advanced user authentication for mobile devices
Clarke NL, Furnell SM
Computers & Security, vol. 26, no. 2, pp109-119, 2007
More details

Malicious or misinformed? Exploring a contributor to the insider threat
Furnell SM
Computer Fraud & Security, September, pp8-12, 2006
More details

Securing the home worker
Furnell SM
Network Security, November, pp6-112, 2006
More details

Risk and Restitution: Assessing how users establish online trust
Lacohee H, Phippen AD, Furnell SM
Computers & Security, Vol. 25, No. 7, pp486-493, 2006
More details

Security mobile devices: technology and attitude
Furnell SM
Network Security, August, pp9-13, 2006
More details

A Composite User Authentication Architecture for Mobile Devices
Clarke NL, Furnell SM
Journal of Information Warfare, vol. 5, no. 2, pp11-29, 2006
More details

Towards an Insider Threat Prediction Specification Language
Magklaras GB, Furnell SM, Brooke PJ
Information Management & Computer Security, vol. 14, no. 4, pp361-381, 2006
More details

Authenticating Mobile Phone Users Using Keystroke Analysis
Clarke NL, Furnell SM
International Journal of Information Security, vol. 6, no. 1, pp1-14, 2006
More details

Safety in numbers? Early experiences in the age of chip and PIN
Furnell SM
Computer Fraud & Security, April, pp4-7, 2006
More details

Usability pitfalls in Wireless LAN Security
Furnell SM, Ghita BV
Network Security, March, pp4-8, 2006
More details

The challenges of understanding and using security: A survey of end-users
Furnell SM, Jusoh A, Katsabas D
Computers & Security, vol. 25, iss. 1, pp27-35, 2006
More details

Replacing passwords: In search of the secret remedy
Furnell SM, Zekri L
Network Security, January, pp 4-8, 2006
More details

The role of academic qualifications in the IT security profession
Furnell SM, Katos V, Clarke NL
DATAWATCH, Information Systems Audit and Control Association (ISACA) - London Chapter, Winter, pp8-15, 2005
More details | External link available

Barriers to usable security in end-user applications
Furnell SM, Jusoh A, Katsabas D, Phippen AD
eMinds: International Journal on Human-Computer Interaction, vol. 1, no. 1, pp51-59, 2005
More details | External link available

Informing the decision process in an automated intrusion response system
Papadaki M, Furnell SM
Information Security Technical Report, vol. 10, no. 3, pp150-161, 2005
More details | External link available

Authentication of users on mobile telephones - A survey of attitudes and practices
Clarke NL, Furnell SM
Computers & Security, vol. 24, no. 7, pp519-527, 2005
More details

Biometrics - The promise versus the practice
Clarke NL, Furnell SM
Computer Fraud and Security, September, pp12-16, 2005
More details

A Preliminary Model of End User Sophistication for Insider Threat Prediction in IT Systems
Magklaras GB, Furnell SM
Computers & Security, vol. 24, no. 5, pp371-380, 2005
More details

Why users cannot use security
Furnell SM
Computers & Security, vol. 24, pp274-279, 2005
More details | External link available

An automated framework for managing security vulnerabilities
Alayed A, Furnell SM, Zhao D, Dowland PS
Information Management & Computer Security, vol. 13, no. 2, pp156-166, 2005
More details

Biometrics: No silver bullets
Furnell SM, Clarke NL
Computer Fraud & Security, August, pp9-14, 2005
More details

Internet threats to end-users: Hunting easy prey
Furnell SM
Network Security, July, pp5-9, 2005
More details

Handheld hazards: The rise of malware on mobile devices
Furnell SM
Computer Fraud & Security, May, pp4-8, 2005
More details

Authenticating ourselves: will we ever escape the password?
Furnell SM
Network Security, March, pp8-13, 2005
More details

E-commerce security: a question of trust
Furnell SM
Computer Fraud & Security, October, pp10-14, 2004
More details

Qualified to help: In search of the skills to ensure security
Furnell SM
Computer Fraud and Security, December, pp10-14, 2004
More details

Malware comes of age: The arrival of the true computer parasite
Furnell SM, Ward J
Network Security, October, pp11-15, 2004
More details

Getting caught in the phishing net
Furnell SM
Network Security, May, pp14-18, 2004
More details

When vulnerability reports can work against us
Furnell SM
Network Security, June, pp11-15, 2004
More details

IDS or IPS: what is best?
Papadaki M, Furnell SM
Network Security, July, pp15-19, 2004
More details

Multi-Dimensional-Personalisation for the online & offline world
Schilke SW, Bleimann U, Furnell SM, Phippen AD
Internet Research, vol. 14, no. 5 pp379-385, 2004
More details | External link available

A long-term trial of alternative user authentication technologies
Furnell SM, Papadopoulos I, Dowland PS
Information Management and Computer Security, Vol. 12, No. 2, pp178-190, 2004
More details

Using security: easier said than done?
Furnell SM
Computer Fraud & Security, April, pp6-15, 2004
More details

Helping us to help ourselves: assessing administrators? use of security analysis tools
Furnell SM, Bolakis S
Network Security, February, pp12-15, 2004
More details

Hacking begins at home: Are company networks at risk from home computers?
Furnell SM
Computer Fraud & Security, January, pp4-7, 2004
More details

Vulnerability exploitation: the problem of protecting our weakest links
Furnell SM
Computer Fraud & Security, November, pp12-15, 2003
More details

The Effects of Audio and Video Correlation and Lip Synchronization
Mued L, Lines BL, Furnell SM, Reynolds PL
Campus Wide Information Systems, vol. 20, no. 4, pp. 159-166, 2003
More details | Download PDF

Keystroke Dynamics on a Mobile Handset: A Feasibility Study
Clarke NL, Furnell SM, Lines BL, Reynolds PL
Information Management and Computer Secuirty, vol. 11, no. 4, pp161-166, 2003
More details | Download PDF

Endpoint study of Internet paths and web pages transfers
Ghita BV, Furnell SM, Lines BL, Ifeachor E
Campus Wide Information Systems, vol. 20, no. 3, pp90-97, 2003
More details | Download PDF

A Model for Monitoring and Migrating Web Resources
Evans MP, Furnell SM
Campus Wide Information Systems, vol. 2, no. 2, pp67-74, 2003
More details | External link available

Considering the Problem of Insider IT Misuse
Furnell SM, Phyo AH
Australian Journal of Information Systems, vol. 10, no. 2, pp134-138, 2003
More details | Download PDF

Enhancing Response in Intrusion Detection Systems
Papadaki M, Furnell SM, Lee SJ, Lines BL, Reynolds PL
Journal of Information Warfare, vol. 2, no. 1, pp90-102, 2002
More details | Download PDF

A prototype tool for information security awareness and training
Furnell SM, Gennatou M, Dowland PS
International Journal of Logisitics Information Management, vol. 15, no. 5, pp352-357, 2002
More details | Download PDF

Assessing the global accessibility of the Internet
Ngini CU, Furnell SM, Ghita BV
Internet Research, vol. 12, no. 4, pp329-338, 2002
More details | Download PDF

An experimental comparison of secret-based user authentication technologies
Irakleous I, Furnell SM, Dowland PS, Papadaki M
Information Management and Computer Security, vol. 10, no. 3, pp100-108, 2002
More details | Download PDF

Insider Threat Prediction Tool: Evaluating the probability of IT misuse
Magklaras GB, Furnell SM
Computers & Security, vol. 21, no. 1, pp62-73, 2002
More details | Download PDF

Acceptance of subscriber authentication methods for mobile telephony devices
Clarke NL, Furnell SM, Rodwell PM, Reynolds PL
Computers & Security, vol. 21, no.3, pp220-228, 2002
More details | Download PDF

Categorising cybercrime and cybercriminals: The problem and potential approaches
Furnell SM
Journal of Information Warfare, vol. 1, no. 2. pp35-44, 2002
More details | Download PDF

The Resource Locator Service: Fixing a Flaw in the Web
Evans MP, Furnell SM
Computer Networks, vol. 37, no 3-4, November, 2001
More details | Download PDF

The promise of Online Distance Learning: Addressing academic and institutional concerns
Furnell SM, Evans MP, Bailey P
Quarterly Review of Distance Education, vol. 1, no. 4, pp281-291, 2001
More details | Download PDF

Network Quality of Service Monitoring for IP Telephony
Ghita BV, Furnell SM, Lines BL, Le Foll D, Ifeachor E
Internet Research, vol. 11, no. 1, pp26-34, 2001
More details | Download PDF

Security analysers: Administrator Assistants or Hacker Helpers?
Furnell SM, Chiliarchaki P, Dowland PS
Information Management and Computer Security, vol. 9, no.2, pp93-101, 2001
More details | Download PDF

Authentication and Supervision: A survey of user attitudes
Furnell SM, Dowland PS, Illingworth HM, Reynolds PL
Computers & Security, vol. 19, no. 6, pp529-539, 2000
Please note: the electronic copy of the survey referred to in this paper is no longer available.
More details | Download PDF

Internet-based security incidents and the potential for false alarms
Evans MP, Furnell SM
Internet Research, vol. 10, no. 3, pp238-245, 2000
More details | Download PDF

A conceptual architecture for real-time intrusion monitoring
Furnell SM, Dowland PS
Information Management and Computer Security, vol. 8, no. 2, pp65-74, 2000
More details | Download PDF

Computer Crime and Abuse: A Survey of Public Attitudes and Awareness
Dowland PS, Furnell SM, Illingworth HM, Reynolds PL
Computers & Security, vol. 18, no. 8, pp715-726, 1999
Please note: the electronic copy of the survey referred to in this paper is no longer available.
More details | Download PDF

A new approach towards security training and awareness amongst the Healthcare Community
Warren MJ, Furnell SM, Sanders P
Informatics in Healthcare Australia, vol. 8, no. 1, pp20-26, 1999
More details | Download PDF

Security implications of Electronic Commerce: A Survey of Consumers and Businesses
Furnell SM, Karweni T
Internet Research, vol. 9, no. 5, pp372-382, 1999
More details | Download PDF

Computer Hacking and Cyber Terrorism: The real threats in the new millenium?
Furnell SM, Warren MJ
Computers & Security, vol. 18, no. 1, pp28-34, 1999
More details | Download PDF

Online Distance Learning: Expectations, Requirements and Barriers
Furnell SM, Evans MP, Phippen AD, Abu-Rgheff MA
Virtual University Journal, vol. 2, no. 2, 1999
More details | Download PDF

Dissecting the 'Hacker Manifesto'
Furnell SM, Dowland PS, Sanders P
Information Management and Computer Security, vol.7, no.2 pp69-75, 1999
More details | Download PDF

Strategies for Content Migration on the World Wide Web
Evans MP, Phippen AD, Müller G, Furnell SM, Sanders P, Reynolds PL
Internet Research, vol.9, no.1, pp25-34, 1999
More details | Download PDF

The ISHTAR guidelines for healthcare security
Furnell SM, Davey J, Gaunt PN, Louwerse CP, Mavroudakis K, Treacher AH
Health Informatics Journal, vol.4, no. 3/4, pp179-183, 1998
NB paper has been scanned from printed copy. We apologise for the screen quality of this paper.
More details | Download PDF

A security framework for online distance learning and training
Furnell SM, Onions PD, Bleimann U, Gojny U, Knahl MH, Röder HF, Sanders P
Internet Research, vol. 8, no. 3, pp236-242, 1998
More details | Download PDF

Network Resource Adaptation in the DOLMEN Service Machine
Evans MP, Kettunen KT, Blackwell GK, Furnell SM, Phippen AD, Hope S, Reynolds PL
Intelligence in Services and Networks: Technology for Cooperative Competition, Mullery et al. (eds.), Springer, 1997
More details

Assessing staff attitudes towards information security in a European healthcare establishment
Furnell SM, Gaunt PN, Holben RF, Sanders P, Stockel CT, Warren MJ
Medical Informatics, vol. 21, no. 2, pp105-112, 1997
NB paper has been scanned from printed copy. We apologise for the screen quality of this paper.
More details | Download PDF

ODESSA - A New Approach to Healthcare Risk Analysis
Warren MJ, Furnell SM, Sanders P
Information Security in Research and Business, Chapman & Hall, pp391-402, 1997
NB paper has been scanned from printed copy. We apologise for the screen quality of this paper.
More details | Download PDF

Computer abuse : Vandalising the information society
Furnell SM, Warren MJ
Internet Research, vol. 7, no.1, pp61-66, 1996
NB paper has been scanned from printed copy. We apologise for the screen quality of this paper.
More details | Download PDF

Development of Security Guidelines for Existing Healthcare Systems
Furnell SM, Sanders P, Warren MJ
Medical Informatics, vol. 20, no. 3, pp139-148, 1995
NB paper has been scanned from printed copy. We apologise for the screen quality of this paper.
More details | Download PDF

A Generic Methodology for Health Care Data Security
Furnell SM, Gaunt PN, Pangalos G, Sanders P, Warren MJ
Medical Informatics, vol 19, no. 3, pp229-445, 1994
NB paper has been scanned from printed copy. We apologise for the screen quality of this paper.
More details | Download PDF

124 Journal papers

Conference papers

Insider Misuse Identification using Transparent Biometrics
Clarke NL, Li F, Alruban A, Furnell SM
Proceedings of the 50th Hawaii International Conference on System Sciences, January 04 - 07, Hawaii USA, 2017
More details | External link available

Information Security Policies: A Review of Challenges and Influencing Factors
Alotaibi M, Furnell SM, Clarke NL
11th International Conference for Internet Technology and Secured Transactions (ICITST), pp 352-358, Barcelona, Spain, 2016
More details | External link available

User profiling from network traffic via novel application-level interactions
Alotibi G, Clarke NL, Li F, Furnell SM
11th International Conference for Internet Technology and Secured Transactions (ICITST), pp 279-285, Barcelona, Spain, 2016
More details | External link available

A Forensic Acquisition and Analysis System for IaaS: Architectural Model and Experiment
Alqahtany S, Clarke NL, Furnell SM, Reich C
11th International Conference on Availability, Reliability and Security, 31 August -2 September, 2016
More details | External link available

Proactive Biometric-Enabled Forensic Imprinting
Alruban A, Clarke NL, Li F, Furnell SM
International Conference on Cyber Incident Response, Coordination, Containment & Control (Cyber Incident 2016), June 13-14, London, UK, 2016
Winner of the Best Paper Award (Cyber Incident 2016)
More details

Information Security and Practice: The User's Perspective
Clarke NL, Li F, Furnell SM, Stengel I, Ganis G
Proceedings of the 11th International Conference On Cyber Warfare and Security (ICCWS-2016), pp81-89, ISSN:2048-9870, ISBN:9781910810835, 17-18 March 2016, Boston, USA, 2016
More details

Transparent Authentication Systems for Mobile Device Security: A Review
Alotaibi S, Furnell SM, Clarke NL
10th International Conference for Internet Technology and Secured Transactions (ICITST), 14-16 Dec, pp. 406-413, 2015
More details | External link available

A Review of Graphical Authentication Utilising a Keypad Input Method
Alsaiari H, Papadaki M, Dowland PS, Furnell SM
Proceedings of The 8th Saudi Students Conference, January 31 - February 1, pp359-374, 2015
More details | External link available

Towards Dynamic Adaption of User's Organisational Information Security Behaviour
Alotaibi M, Furnell SM, Clarke NL
Proceedings of the 13th Australian Information Security Management Conference (AISM2015), Perth, Australia, pp28-36, ISBN 0-7298-0733-9, 2015
More details

Security, Privacy and Usability - A Survey of Users' Perceptions and Attitudes
Al Abdulwahid A, Clarke NL, Furnell SM, Stengel I, Reich C
12th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2015), Valencia, Spain, September 1-2, pp153-168, ISBN 978-3-319-22906-5, 2015
More details | External link available

A Survey of Continuous and Transparent Multibiometric Authentication Systems
Al Abdulwahid A, Clarke NL, Furnell SM, Stengel I, Reich C
Proceedings of the 14th European Conference on Cyber Warfare and Security (ECCWS-2015), pp 1-10, ISBN: 978--91081-2-3, ISSN: 204-8610, 2015
More details | External link available

The Current Use of Authentication Technologies: An Investigative Review
Al Abdulwahid A, Clarke NL, Stengel I, Furnell SM, Reich C
Proceedings of the IEEE 2015 International Conference on Cloud Computing (ICCC15), pp 239-246, ISBN 15: 978-1-4673-6618-2, 2015
More details | External link available

Cloud Forensics: A Review of Challenges, Solutions and Open Problems
Alqahtany S, Clarke NL, Furnell SM, Reich C
Proceedings of the IEEE 2015 International Conference on Cloud Computing (ICCC15), pp 88-96, ISBN 15: 978-1-4673-6618-2, 2015
More details

Behavioral-Based Feature Abstraction from Network Traffic
Alotibi G, Li F, Clarke NL, Furnell SM
10th International Conference on Cyber warfare and Security, Kruger National Park, South Africa, 24-25 March, pp1-9, ISBN 978-1-910309-97-1, 2015
More details

Text-Based Active Authentication for Mobile Devices
Saevanee H, Clarke NL, Furnell SM, Biscioneb V
29th IFIP TC11 International Conference on ICT Systems Security & Privacy Protection, Marrakech, Morocco, 2-4 June 2014, pp 99-112, ISBN: 978-3-642-55414-8, 2014
More details | External link available

A Forensically-Enabled IAAS Cloud Computing Architecture
Alqahtany S, Clarke NL, Furnell SM, Reich C
Proceedings of the 12th Australian Digital Forensics Conference, pp75-83, ISBN: 978-0-7298-0719-7, 2014
More details | External link available

A User-oriented Network Forensic Analyser: The Design of a High-Level Protocol Analyser
Joy D, Li F, Clarke NL, Furnell SM
Proceedings of the 12th Australian Digital Forensics Conference, 1-3 December, ECU Joondalup Campus, Perth, Western Australia, pp 84-93, ISBN 978-0-7298-0719-7, 2014
More details

Performance Evaluation of A Technology Independent Security Gateway for Next Generation Networks
Li F, Clarke NL, Furnell SM, Mkwawa IH
Wireless and Mobile Computing, Networking and Communications (WiMob), IEEE 10th International Conference on Emergency Networks for Public Protection and Disaster Relief, 8-10 October 2014 in Larnaca, Cyprus, page 281-286, 2014
More details | External link available

Towards A Unified OAI-PMH Registry
Goebert S, Harriehausen-Mühlbauer B, Furnell SM
Proceedings of the 11th IS&T Archiving Conference, pp97-100, ISBN: 978-0-89208-309-1, 2014
More details

Alternative Graphical Authentication for Online Banking Environments
Alsaiari H, Papadaki M, Dowland PS, Furnell SM
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2014), Plymouth, UK, July 8-9, pp122-136, ISBN: 978-1-84102-375-5, 2014
Can be ordered on-line.
More details | Download PDF

Cloud Forensics Challenges
Alqahtany S, Clarke NL, Furnell SM
Proceedings of the 7th SSC Saudi Students Conference - UK, pp86-93, ISBN: 9780956904522, 2014
More details | External link available

Towards an Automated Forensic Examiner (AFE) Based upon Criminal Profiling & Artificial Intelligence
Al Fahdi M, Clarke NL, Furnell SM
Proceedings of the 11th Australian Digital Forensics Conference, Perth, Australia, 2-4 December, pp 1-9, ISBN 978-0-7298-0711-1, 2013
More details

A Conceptual Model for Federated Authentication in the Cloud
Al Abdulwahid A, Clarke NL, Furnell SM, Stengel I
Proceedings of the 11th Australian Information Security Management Conference (AISM2013), Perth, Australia, 2-4 December, pp 1-11, ISBN 978-0-7298-0710-4, 2013
More details | External link available

A Technology Independent Security Gateway for Future Emergency Telecommunication Systems (ETS)
Li F, Clarke NL, Furnell SM, Fajardo JO, Liberal F, Sidibe M
Proceeding of the International Workshop on Emergency Telecommunications Systems (ETS 2013), Wrexham, UK, 12 September, pp299-308, 2013
More details

Challenges to Digital Forensics: A Survey of Researchers & Practitioners Attitudes and Opinions
Al Fahdi M, Clarke NL, Furnell SM
Proceedings of ISSA (Information Security South Africa), Johannesburg, 14-16 August, ISBN:978-1-4799-0809-7, 2013
More details

Towards Continuous and Convenient User Authentication
Furnell SM, Clarke NL
The Future of Identity: A compilation of research papers from a workshop, City University London / EPSRC, April, 2013
More details

E-Invigilator: A Biometric-Based Supervision System for e-Assessments
Clarke NL, Dowland PS, Furnell SM
The International Conference on Information Society (i-Society 2013), Toronto, Canada, 24-26 June, 2013
More details

A Technology Independent Security Gateway for Real-Time Multimedia Communication
Li F, Clarke NL, Furnell SM
Proceedings of the 7th International Conference on Network and System Security (NSS2013), 3-4 June 2013, Madrid, Spain, pp14-25, 2013
More details

Assessing the usability of application level security warnings
Zaaba ZF, Furnell SM, Dowland PS, Stengel I
Eleventh Annual Security Conference, Las Vegas, Nevada, US, 11-13 April, 2012
More details

A Response Strategy Model for Intrusion Response Systems
Anuar NB, Papadaki M, Furnell SM, Clarke NL
27th IFIP International Information Security and Privacy Conference - SEC2012, Heraklion, Crete, Greece, 4-6 June, pp573-578, 2012
More details

The Insider Threat Prediction and Specification Language
Magklaras GB, Furnell SM
Proceedings of the Ninth International Network Conference (INC2012), Port Elizabeth, South Africa, July, ISBN: 978-1-84102-315-1, pp51-61, 2012
Can be ordered on-line.
More details | Download PDF

A Novel Security Architecture for a Space-Data DTN
Clarke NL, Katos V, Menesidou SA, Ghita BV, Furnell SM
10th International Conference on Wired/Wireless Internet Communications – WWIC 2012, Santorini, Greece, June 6-8, pp342-349, 2012
More details | External link available

Multi-Modal Behavioural Biometric Authentication for Mobile Devices
Saevanee H, Clarke NL, Furnell SM
27th IFIP International Information Security and Privacy Conference - SEC2012, Heraklion, Crete, Greece, 4-6 June, pp465-474, 2012
More details

A Risk Index Model for Security Incident Prioritisation
Anuar NB, Furnell SM, Papadaki M, Clarke NL
Proceedings of the 9th Australian Information Security Management Conference (ASIM 2011), Perth, Australia, 5-7 December, 2011
More details

A preliminary investigation of distributed and cooperative user authentication
Hocking C, Furnell SM, Clarke NL, Reynolds PL
Proceedings of the 9th Australian Information Security Management Conference (secAU 2011), Perth, Australia, 5-7 December, 2011
More details

Multifactor Graphical Passwords: An Assessment of End-User Performance
Jali MZ, Furnell SM, Dowland PS
Proceedings of the 7th International Conference of Information Assurance & Security (IAS2011), Melaka, Malaysia, 5-8 December 2011. IEEE 978-1-4577-2153-3, 2011
More details

Quantifying the effect of graphical password guidelines for better security
Jali MZ, Furnell SM, Dowland PS
Future Challenges in Security and Privacy for Academia and Industry (SEC 2011), Lucerne, Switzerland, 7-9 June 2011. Volume 354/2011, Springer-Verlag, pp80-91, 2011
More details | External link available

SMS Linguistic Profiling Authentication on Mobile Devices
Saevanee H, Clarke NL, Furnell SM
5th International Conference on Network and System Security (NSS 2011), p224-229, 2011
More details

Emerging risks in massively multiplayer online role playing games
Sanders B, Atkinson S, Dowland PS, Furnell SM, Papadaki M
EU Kids Online Conference, Friday 23 September, New Academic Building LSE, 2011
More details | External link available

End-User Perception and Usability of Information Security
Zaaba ZF, Furnell SM, Dowland PS
Proceedings of the Fifth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2011), London, UK, ISBN: 978-1-84102-284-0, pp97-107, 2011
Can be ordered on-line.
More details | Download PDF

LUARM – An Audit Engine for Insider Misuse Detection
Magklaras GB, Furnell SM, Papadaki M
Proceedings of the Sixth International Workshop on Digital Forensics & Incident Analysis (WDFIA 2011), London, UK, ISBN: 978-1-84102-285-7, pp133-148, 2011
Can be ordered on-line.
More details | Download PDF

Towards a Flexible, Multi-Level Security Framework for Mobile Devices
Clarke NL, Karatzouni S, Furnell SM
Proceedings of the 10th Security Conference, Las Vegas, USA, 4-6 May, 2011
More details | Download PDF

Behavioural Biometric Authentication For Mobile Devices
Saevanee H, Clarke NL, Furnell SM
Proceedings of the Collaborative European Research Conference (CERC2011), 14-15 January, Cork, Ireland, ISSN: 2220-4164, pp175-184, 2011
More details

Barriers to E-Safety Peer Education: An analysis of teacher concerns
Atkinson S, Furnell SM, Phippen AD
Proceedings of E-Youth Conference, Antwerp, 27-28 May, 2010
More details | Download PDF

Online Addiction: Privacy Risks in Online Gaming Environments
Sanders B, Chen V, Zahra D, Dowland PS, Atkinson S, Papadaki M, Furnell SM
Proceedings of the International Conference on Management of Emergent Digital EcoSystems (MEDES), October 26-29, Bangkok, Thailand, 2010
More details

Assessing the Usability of End-User Security Software
Ibrahim T, Furnell SM, Papadaki M, Clarke NL
Lecture Notes in Computer Science, Volume 6264/2010, pp177-189, 2010
More details | External link available

A distributed and cooperative user authentication framework
Hocking C, Furnell SM, Clarke NL, Reynolds PL
Proceedings of the 6th International Confernece on Information Assurance and Security (IAS 2010), Atlanta, USA, 23-25 August, pp304-310, 2010
More details

An investigation and survey of response options for Intrusion Response Systems (IRSs)
Anuar NB, Papadaki M, Furnell SM, Clarke NL
Proceedings of the 9th Annual Information Security South Africa Conference, Sandton, South Africa, 2 - 4 August, pp1-8, ISBN: 978-1-4244-5493-8, 2010
More details | External link available

Psycho-Analytical Considerations in Internet Marketing – Focusing on Human Needs and Personal Trust
Rimbach F, Bleimann U, Furnell SM
Proceedings of the Eighth International Network Conference (INC 2010), Heidelberg, Germany, 8-10 July, ISBN: 978-1-84102-259-8, pp345-354, 2010
Can be ordered on-line.
More details | Download PDF

Implications and Risks of MMORPG Addiction: Motivations, Emotional Investment, Problematic Usage and Personal Privacy
Sanders B, Dowland PS, Furnell SM
Proceedings of the South African Information Security Multi-Conference (SAISMC 2010), Port Elizabeth, South Africa, 17-18 May, ISBN: 978-1-84102-256-7, pp61-73, 2010
Can be ordered on-line.
More details | Download PDF

An Analysis of Information Security Awareness within Home and Work Environments
Talib S, Clarke NL, Furnell SM
Fifth International Conference on Availability, Reliability and Security (“ARES 2010 – The International Dependability Conference”), Krakow, Poland, 15-18th Feb, , 2010
More details | Download PDF

Playing safe: A prototype game for raising awareness of social engineering
Newbould M, Furnell SM
Proceedings of the 7th Australian Information Security Management Conference (SECAU 2009), 1-3 December, Perth, Australia, On-line proceedings only, 2009
More details | External link available

Automated precautionary measures for managing system security vulnerabilities
Zhao D, Furnell SM, Alayed A
International Conference on E-Business and Information System Security, EBISS 2009, 23-24 May, Wuhan, China, pp1-5, ISBN: 9781424429097, 2009
More details | External link available

The research on a patch management system for enterprise vulnerability update
Zhao D, Furnell SM, Alayed A
International Conference on Information Engineering, ICIE 2009, 10-11 July, Taiyuan, Shanxi, China, pp250-253, ISBN: 978-0-7695-3679-8, 2009
More details | External link available

Improving Awareness of Social Engineering Attacks
Smith A, Papadaki M, Furnell SM
Proceedings of the 9th IFIP World Congress on Computer Education (WCCE 2009), Bento Gonclaves, Brazil, 27-31 July, 2009
More details

Evaluating Web-Based User Authentication using Graphical Techniques
Jali MZ, Furnell SM, Dowland PS
Proceedings of the Third International Symposium on Human Aspects of Information Security & Assurance (HAISA 2009), Athens, Greece, ISBN: 978-1-84102-231-4, pp108-118, 2009
Can be ordered on-line.
More details | Download PDF

An Assessment of People’s Vulnerabilities in Relation to Personal and Sensitive Data
Sanders B, Dowland PS, Furnell SM
Proceedings of the Third International Symposium on Human Aspects of Information Security & Assurance (HAISA 2009), Athens, Greece, ISBN: 978-1-84102-231-4, pp50-60, 2009
Can be ordered on-line.
More details | Download PDF

Assessing the Usability of Personal Internet Security Tools
Ibrahim T, Furnell SM, Papadaki M, Clarke NL
8th European Conference on Information Warfare and Security (ECIW), Military Academy, Lisbon & the University of Minho, Braga, Portugal, 6-7 July, 2009
More details | Download PDF

Risk culture influences in Internet safety and security
Atkinson S, Furnell SM, Phippen AD
Proceedings of the Third International Symposium on Human Aspects of Information Security & Assurance (HAISA 2009), Athens, Greece, ISBN: 978-1-84102-231-4, pp61-70, 2009
Can be ordered on-line.
More details

Using peer education to encourage safe online behaviour
Atkinson S, Furnell SM, Phippen AD
EU Kids Online, London School of Economics (online proceedings), 2009
More details | Download PDF | External link available

E-Safety and E-Security: Raising security awareness among young people using peer education
Atkinson S, Furnell SM, Phippen AD
Proceedings of the 8th Security Conference, April, Las Vegas, USA, 2009
More details | Download PDF

Flexible and Transparent User Authentication for Mobile Devices
Clarke NL, Karatzouni S, Furnell SM
Proceedings of the 24th IFIP TC 11 International Information Security Conference, Pafos, Cyprus, May 18-20, ISBN: 978-3-642-01243-3, pp1-12, 2009
More details

Evaluating the usability impacts of security interface adjustments in Word
Helala M, Furnell SM, Papadaki M
Proceedings of 6th Australian Information Security Management Conference, Perth, Western Australia, 1-3 December, pp48-55, 2008
More details | Download PDF

Effective Information Assurance for SMEs
Dimopoulos V, Furnell SM, Clarke NL
Proceedings of he 11th Annual Working Conference on Information Security Management, 16-17 October, Richmond, USA, pp27-45, ISBN: 978-3-901882-31-9, 2008
Can be ordered on-line.
More details | Download PDF

The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset
Tjhai GC, Papadaki M, Furnell SM, Clarke NL
Lecture Notes in Computer Science, Volume 5185/2008, ISBN: 978-3-540-85734-1, pp139-150, 2008
More details | External link available

Investigating the problem of IDS false alarms: An experimental study using Snort
Tjhai GC, Papadaki M, Furnell SM, Clarke NL
Proceeding of the 23rd International Information Security Conference (SEC 2008), Milan, Italy, 8-10 September, pp253-267, 2008
More details

Neural Network Estimation of TCP Performance
Ghita BV, Furnell SM
Proceedings of the 2008 International Conference on Communication Theory, Reliability, and Quality of Service (CTRQ 2008), Bucharest, Romania, 29 June – 5 July, pp53-58, 2008
More details | External link available

A Practical Assessment of Social Engineering Vulnerabilities
Bakhshi T, Papadaki M, Furnell SM
Proceedings of the Second International Symposium on Human Aspects of Information Security & Assurance (HAISA 2008), Plymouth, UK, pp12-23, 2008
Can be ordered on-line.
More details | Download PDF

Assessing the challenges of Intrusion Detection Systems
Ibrahim T, Furnell SM, Papadaki M, Clarke NL
Proceedings of the 7th Security Conference, Las Vegas, USA, 2nd-3rd June, 2008
More details | Download PDF

Transparent Facial Recognition for Mobile Devices
Clarke NL, Karatzouni S, Furnell SM
Proceedings of the 7th Security Conference, Las Vegas, USA, 2nd-3rd June, 2008
More details | Download PDF

Device- versus Network-Centric Authentication Paradigms for Mobile Devices: Operational and Perceptual Trade-Offs
Karatzouni S, Clarke NL, Furnell SM
5th Australian Information Security Management Conference, Mount Lawley, Australia, 5th December, 2007
More details | Download PDF

Building a Trusted Community for Mobile Ad Hoc Networks Using Friend Recommendation
Razak SA, Furnell SM, Clarke NL, Brooke PJ
Ad-Hoc, Mobile, and Wireless Networks, LNCS, vol: 4686/2007, pp129-141, 2007
More details | External link available

Pre-execution Security Policy Assessment of Remotely Defined BPEL-Based Grid Processes
Fischer KP, Bleimann U, Furnell SM
Proceedings of the 4th International Conference on Trust, Privacy & Security in Digital Business, September 3 – 7, Regensburg, Germany, ISBN: 978-3-540-74408-5, pp178-189, 2007
More details

Utilising Biometrics for Transparent Authentication on Mobile Devices
Karatzouni S, Clarke NL, Furnell SM
Proceedings of the 2nd International Conference on Internet Technologies and Applications, 4-7 September, Wrexham, UK, ISBN: 978-0-946881-54-3, pp549–557, 2007
More details | Download PDF | External link available

A practical usability evaluation of security features in end-user applications
Furnell SM, Katsabas D, Dowland PS, Reid F
Proceedings of the 22nd IFIP International Information Security Conference (IFIP SEC 2007), Sandton, South Africa, 14-16 May, pp. 205-216, 2007
More details

Security Policy Enforcement in BPEL-Defined Collaborative Business Processes
Fischer KP, Bleimann U, Fuhrmann W, Furnell SM
Proceedings of the 1st International Workshop on Security Technologies for Next Generation Collaborative Business Applications (SECOBAP 07), April 15-16 & 20, Istanbul, Turkey, ISBN: 1-4244-0832-6, pp 685-694, 2007
More details

Perceptions of User Authentication on Mobile Devices
Karatzouni S, Furnell SM, Clarke NL, Botha RA
Proceedings of the ISOneWorld Conference, Las Vegas, USA, April 11-13, CD Proceedings (0-9772107-6-6), 2007
More details | Download PDF

Assessing the usability of system-initiated and user-initiated security events
Furnell SM, Chatziapostolou D
Proceedings of the ISOneWorld Conference, Las Vegas, USA, April 11-13, CD Proceedings (0-9772107-6-6), 2007
More details | Download PDF

Considering the Usability of End-User Security Software
Furnell SM, Jusoh A, Katsabas D, Dowland PS
Proceedings of 21st IFIP International Information Security Conference (IFIP SEC 2006), Karlstad, Sweden, 22-24 May, pp307-316, 2006
More details

Assessing the usability of WLAN security for SOHO users
Ghita BV, Furnell SM
Proceedings of the Fifth Security Conference 2006, Las Vegas, USA, 19-20 April, CD Proceedings Only, 2006
More details | Download PDF

A New Taxonomy for Intrusion Detection
Tucker C, Furnell SM, Ghita BV, Brooke PJ
Proceedings of the Sixth International Network Conference (INC2006), Plymouth, UK, 11-14 July, pp253-260, 2006
More details | Download PDF

Security-Relevant Semantic Patterns of BPEL in Cross-Organisational Business Processes
Fischer KP, Bleimann U, Fuhrmann W, Furnell SM
Proceedings of the Sixth International Network Conference (INC2006), Plymouth, UK, 11-14 July, pp203-212, 2006
More details | Download PDF

From Page Ranking to Topic Sensitive Page Ranking: Implementation and Impact
Rimbach F, Dannenberg M, Bleimann U, Furnell SM
Proceedings of the Sixth International Network Conference (INC2006), Plymouth, UK, 11-14 July, pp27-34, 2006
More details | Download PDF

Enhancing Privacy Through Anonymous Recommendation for Multi-Dimensional-Personalisation
Schilke SW, Furnell SM, Bleimann U, Phippen AD
Proceedings of the 5th Security Conference, April 19-20, Las Vegas, USA, ISBN: 0-9772107-2-3, 2006
Full proceedings available here.
More details | Download PDF

A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks – A Friend Approach
Razak SA, Furnell SM, Clarke NL, Brooke PJ
Proceedings of the IEEE International Conference on Intelligence and Security Informatics Conference (ISI 2006), San Diego, CA, USA, pp590-595, May 23-24, 2006
More details | External link available

Attack Pattern Analysis: Trends in Malware Variant Development
Papadaki M, Furnell SM, Clarke NL, Abu-Bakar UA, Pinkney G
Proceedings of the 5th Security Conference, Las Vegas, April 19 -20, 2006
More details

Considering the Security Challenges in Consumer-Oriented eCommerce
Furnell SM
Proceedings of The 5th IEEE International Symposium on Signal Processing and Information Technology, Athens, Greece, 18-21 December, pp534-539, 2005
More details

Considering the role of academic qualifications for IT security professionals
Furnell SM, Katos V, Clarke NL
Proceedings of the 1st Colloquium for Information Systems Security Education, Asia Pacific, Adelaide, Australia, 21-22 November, pp1-11, 2005
More details

User Authentication for Mobile Devices: A Composite Approach
Clarke NL, Furnell SM
Proceedings of the 6th Australian Information Warfare and Security Conference, Geelong, Australia, 25-26 November, pp48-56, 2005
More details | Download PDF

A protection profiles approach to risk analysis for small and medium enterprises
Dimopoulos V, Furnell SM
Proceedings of IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference on Security Management, Integrity, and Internal Control in Information Systems, Fairfax, Virginia, 1-2 December, pp267-283, 2005
More details

A Chinese Wall Approach for Anonymous Recommendation in a Multi-Dimensional-Personalisation Scenario
Schilke SW, Bleimann U, Furnell SM, Phippen AD
Proceedings of Sciences Electroniques, Technologies de l'Information et des Telecommunications (SETIT) 2005, 27-31 March 2005, p155 (abstract), ISBN: 9973-51-546-3, 2005
Full paper available on the CD
More details | Download PDF

HTTP-Aware Anonymisation of Packet Traces
Salama E, Ghita BV, Furnell SM
Proceedings of the First International Conference on Internet Technologies and Applications, Wrexham, UK, 7-9 September, pp 421-431, 2005
More details

A Two-tier Intrusion Detection System for Mobile Ad Hoc Networks
Razak SA, Furnell SM, Brooke PJ
Proceedings of the Fourth European Conference on Information Warfare and Security, Glamorgan, South Wales, 11-12 July, 2005
CD Only Proceedings
More details

Artificial Impostor Profiling for Keystroke Dynamics on a Mobile Handset
Lecomte J, Clarke NL, Furnell SM
Proceedings of Fifth International Network Conference (INC 2005), July 5-7, Samos, Greece, pp199-206, 2005
More details | Download PDF

TCP Performance Estimation Using Neural Networks Modelling
Ghita BV, Furnell SM, Lines BL, Ifeachor E
Proceedings of Fifth International Network Conference (INC 2005), July 5-7, Samos, Greece, pp19-30, 2005
More details | Download PDF

A Security Infrastructure for Cross-Domain Deployment of Script-Based Business Processes in SOC Environments
Fischer KP, Bleimann U, Fuhrmann W, Furnell SM
Proceedings of Fifth International Network Conference (INC 2005), July 5-7, Samos, Greece, pp207-216, 2005
More details | Download PDF

Using Human Computer Interaction principles to promote usable security
Katsabas D, Furnell SM, Dowland PS
Proceedings of Fifth International Network Conference (INC 2005), July 5-7, Samos, Greece, pp235-242, 2005
More details | Download PDF

Organisational Security Culture: Embedding Security Awareness, Education and Training
Furnell SM, Clarke NL
Proceedings of the 4th World Conference on Information Security Education WISE 2005, 18-20 May, Moscow, Russia, pp67-74, 2005
More details | Download PDF

Intrusion Detection via Behavioural Profiling on Mobile and Wireless Networked Devices
Zincir I, Furnell SM, Phippen AD
Proceedings of the 11th Annual Euromedia Conference 2005, Toulouse, France, 11-13 April, pp67-71, 2005
More details | Download PDF

Identifying the security requirements for virtual university environments
Ruiz VC, Furnell SM, Phippen AD, Dowland PS, Stengel I, Bleimann U
Proceedings of the Fourth Security Conference 2005, Las Vegas, USA, 30-31 March, 2005
More details | Download PDF

Effective IT Security for Small and Medium Enterprises
Dimopoulos V, Furnell SM
Proceedings of the Fourth Security Conference 2005, Las Vegas, USA, 30-31 March, 2005
More details | Download PDF

PassImages : an alternative method of user authentication
Charruau D, Furnell SM, Dowland PS
Proceedings of the ISOneWorld 2005, Las Vegas, USA, 30 March - 1 April, 2005
More details | Download PDF

Insider Misuse Threat Survey: Investigating IT misuse from legitimate users
Magklaras GB, Furnell SM
Proceedings of the 5th Australian Information Warfare & Security Conference, Perth Western Australia, 25-26 November, CDROM, pp42-51, 2004
More details

Behavioural Profiling In Wireless Networks
Zincir I, Furnell SM, Phippen AD
Proceedings of the 5th Annual Postgraduate Conference PGNet 2004, 28-29 June, Liverpool, UK, pp128-133, 2004
More details | Download PDF

A Framework for Monitoring Insider Misuse of IT Applications
Phyo AH, Furnell SM, Ifeachor E
Proceedings of the ISSA 2004 Enabling Tomorrow Conference, South Africa, 30 June-2 July, 2004
More details

Automating the process of intrusion response
Papadaki M, Furnell SM
Proceedings of the 5th Australian Information Warfare Security Conference, Perth, Australia, 25-26 November, CDROM, pp32-41, 2004
More details

Approaches to IT Security in Small and Medium Enterprises
Dimopoulos V, Furnell SM, Jennex M, Kritharas I
Proceedings of the 2nd Australian Information Security Management Conference 2004, Perth, Australia, 26 November 2004, CD-ROM, pp73-82, 2004
More details | Download PDF

Attacks against Mobile Ad Hoc Networks Routing Protocols
Razak SA, Furnell SM, Brooke PJ
Proceedings of 5th Annual Postgraduate Symposium on The Convergence of Telecommunications, Networking & Broadcasting, PGNET 2004, Liverpool, UK, 28-29 June, pp147-152, 2004
More details

A Framework For Role-Based Monitoring of Insider Misuse
Phyo AH, Furnell SM, Portilla F
Proceedings of IFIP/SEC 2004 - 18th International Conference on Information Security, Toulouse, France, 23-26 August, pp51-65, 2004
More details

A Long-term Trial of Keystroke Profiling using Digraph, Trigraph and Keyword Latencies
Dowland PS, Furnell SM
Proceedings of IFIP/SEC 2004 - 19th International Conference on Information Security, Toulouse, France, 23-26 August, pp275-289, 2004
More details

Optimising Video Layers to the Available Bandwidth Based for Packet Networks
Thakur A, Lines BL, Reynolds PL, Knahl MH, Furnell SM
Proceedings of the Fourth International Network Conference (INC 2004), Plymouth, UK, 6-9 July 2004, CD-ROM, 2004
More details | Download PDF

Multi-Dimensional-Personalisation for the online and offline world
Schilke SW, Bleimann U, Furnell SM, Phippen AD
Proceedings of the Fourth International Network Conference (INC 2004), Plymouth, UK, 6-9 July 2004, pp545-552, 2004
More details | Download PDF

Architectural specifications and design for an automated vulnerability resolver
Alayed A, Furnell SM, Zhao D, Barlow I, Tomlinson M
Proceedings of the Fourth International Network Conference (INC 2004), Plymouth, UK, 6-9 July 2004, pp303-310, 2004
More details | Download PDF

A Correlation Framework for Continuous User Authentication Using Data Mining
Singh H, Furnell SM, Dowland PS, Lines BL, Kaur S
Proceedings of the Fourth International Network Conference (INC 2004), Plymouth, UK, 6-9 July 2004, pp237-245, 2004
More details | Download PDF

Factors affecting the adoption of IT risk analysis
Dimopoulos V, Furnell SM, Barlow I, Lines BL
The 3rd European Conference on Information Warfare and Security Royal Holloway, University of London, UK, 28-29 June, 2004
More details | Download PDF

The Adoption of Criminal Profiling for Computer Crime
Preuss J, Furnell SM, Lea S
EICAR 2004 Conference CD-rom: Best Paper Proceedings, 2004
More details | Download PDF

Using protection profiles to simplify risk management
Dimopoulos V, Furnell SM, Barlow I, Lines BL
The Security Conference, April 14/15, Las Vegas, USA, 2004
More details | Download PDF

Patient Consent Advisory System
Karweni T, Furnell SM, Gaunt PN
Proceedings of Euromedia 2004, Hasselt, Belgium, 21-23 April, pp133-137, 2004
More details

A Conceptual Framework for Monitoring Insider Misuse
Phyo AH, Furnell SM
Proceedings of Euromedia 2004, Hasselt, Belgium, 21-23 April, pp90-95, 2004
More details

Application of Keystroke Analysis to Mobile Text Messaging
Clarke NL, Furnell SM, Lines BL, Reynolds PL
Proceedings of the 3rd Security Conference, Las Vegas, USA, 14-15 April, 2004
More details | Download PDF

A Detection-Oriented Classification of Insider IT Misuse
Phyo AH, Furnell SM
Proceedings of the 3rd Security Conference, Las Vegas, USA, 14-15 April, 2004
More details

Operational Characteristics of an Automated Intrusion Response System
Papadaki M, Furnell SM, Lines BL, Reynolds PL
Communications and Multmedia Security: Advanced Techniques for Network and Data Protection, pp65-75, 2003
More details

Considering IT Risk Analysis in Small and Medium Enterprises
Dimopoulos V, Furnell SM, Barlow I
Proceedings of the 1st Australian Information Security Management Conference 2003 (InfoSec03), Perth, Australia, 24 November, 2003
More details | Download PDF

Interpolation of Packet Loss and Lip Sync Error on IP Media
Mued L, Lines BL, Furnell SM
Proceedings Volume V, International Conference on Computer, Communication and Control Technologies (CCCT?03), Orlando, USA, 31 July - 2 August, 2003
More details | Download PDF

Cybercrime: Vandalizing the Information Society
Furnell SM
Proceedings of the International Conference on Web Engineering, ICWE 2003, Oviedo, Spain, 14-18 July, pp8-16, 2003
More details

The Effects of Lip Synchronization in IP Conferencing
Mued L, Lines BL, Furnell SM, Reynolds PL
Proceedings of the International Conference on Visual Information Engineering ? VIE 2003, University of Surrey, UK, 7-9 July, 2003
More details | Download PDF

Data Gathering for Insider Misuse Monitoring
Phyo AH, Furnell SM
Proceedings of the 2nd European Conference on Information Warfare and Security, Reading, UK, 30 June - 1 July, pp247-254, 2003
More details | Download PDF

Improving Security Awareness And Training Through Computer-Based Training
Furnell SM, Warren A, Dowland PS
Proceedings of the WISE Conference, Monterey, USA, July, pp287-301, 2003
More details | Download PDF

Using Keystroke Analysis as a mechanism for Subscriber Authentication on Mobile Handsets
Clarke NL, Furnell SM, Lines BL, Reynolds PL
Proceedings of the IFIP SEC 2003 Conference, Athens, Greece, May, pp97-108, 2003
More details | Download PDF

Assessing IT Security Culture: System Administrator and End-User
Finch J, Furnell SM, Dowland PS
Proceedings of ISOneWorld Conference 2003, Las Vegas, USA, April 23-25, CD Only, 2003
More details | Download PDF

Evaluating the reliability of commercially available biometric devices
Dimopoulos V, Fletcher J, Furnell SM
Proceedings of Euromedia 2003, Plymouth, England, 14-16 April, pp166-174, 2003
More details | Download PDF

Biometric Authentication for Mobile Devices
Clarke NL, Furnell SM, Reynolds PL
Proceedings of the 3rd Australian Information Warfare and Security Conference, Perth, Western Australia, 28-29 November 2002, pp61-69, 2002
More details | Download PDF

Watching your own: The problem of insider IT misuse
Furnell SM, Phyo AH
Proceedings of AiCE 2002 ? Third Australian Institute of Computer Ethics Conference, Sydney, Australia, 30 September 2002, pp17-24, 2002
More details | Download PDF

Endpoint study of Internet paths and web pages transfers
Ghita BV, Furnell SM, Lines BL, Ifeachor E
Proceedings of the Third International Network Conference (INC 2002), Plymouth, UK, 16-18 July 2002, pp261-270, 2002
More details | Download PDF

Investigating Interaction of Audio and Video Quality as Perceived in Low-Cost Multimedia Conferencing Systems
Mued L, Lines BL, Furnell SM, Reynolds PL
Proceedings of the Third International Network Conference (INC 2002), Plymouth, UK, 16-18 July 2002, pp181-189, 2002
More details | Download PDF

WebRUM: A Model for Measuring Web-Wide Resource Usage
Evans MP, Furnell SM
Proceedings of the Third International Network Conference (INC 2002), Plymouth, UK, 16-18 July 2002, pp11-21, 2002
More details | Download PDF

Critical awareness ? The problem of monitoring security vulnerabilities
Furnell SM, Alayed A, Barlow I, Dowland PS
Proceedings of European Conference on Information Warfare and Security, 8-9 July 2002, Brunel, UK, pp85-92, 2002
More details | Download PDF

Subscriber Authentication for Mobile Phones through the Implementation of Keystroke Dynamics
Clarke NL, Furnell SM, Lines BL, Reynolds PL
Proceedings of the Third International Network Conference (INC 2002), Plymouth, UK, 16-18 July, pp347-355, 2002
More details | Download PDF

Advanced Subscriber Authentication Approaches For Third Generation Mobile Systems
Clarke NL, Furnell SM, Reynolds PL, Rodwell PM
Proceedings of the Third International Conference on 3G Mobile Communication Technologies, London, UK, 8-10 May, 2002
More details | Download PDF

A Web-Based Resource Migration Protocol Using WebDAV
Evans MP, Furnell SM
Proceedings of WWW 2002 - The Eleventh InternationalWorld Wide Web Conference, Honolulu, Hawaii, USA, 7-11 May, pp263-271, 2002
More details | External link available

Addressing Internet security vulnerabilities - A benchmarking study
Alayed A, Furnell SM, Barlow I
Proceedings of IFIP/SEC 2002 - 17th International Conference on Information Security, Cairo, Egypt, 7-9 May, pp121-132, 2002
More details

Keystroke Analysis as a Method of Advanced User Authentication and Response
Dowland PS, Furnell SM, Papadaki M
Proceedings of IFIP/SEC 2002 - 17th International Conference on Information Security, Cairo, Egypt, 7-9 May, pp215-226, 2002
More details

An Integrated Network and System Management Framework based on Adapted Software Components
Knahl MH, Bleimann U, Furnell SM, Hofmann HD
Proceedings of Euromedia 2002, Modena, Italy, 15-17 April, pp113-118, 2002
More details | Download PDF

A Response-Oriented Taxonomy of IT System Intrusions
Papadaki M, Furnell SM, Lines BL, Reynolds PL
Proceedings of Euromedia 2002, Modena, Italy, 15-17 April, pp87-95, 2002
More details | Download PDF

The problem of categorising cybercrime and cybercriminals
Furnell SM
Proceedings of the 2nd Australian Information Warfare and Security Conference, Perth, Western Australia, 29-30 November, 2001
More details | Download PDF

Security Vulnerabilities and System Intrusions ? The need for Automatic Response Frameworks
Papadaki M, Magklaras GB, Furnell SM, Alayed A
Proceedings of the IFIP 8th Annual Working Conference on Information Security Management & Small Systems Security, Las Vegas, 27-28 September, 2001
More details | Download PDF

A Preliminary Investigation of User Authentication Using Continuous Keystroke Analysis
Dowland PS, Singh H, Furnell SM
Proceedings of the IFIP 8th Annual Working Conference on Information Security Management & Small Systems Security, Las Vegas, 27-28 September, 2001
More details | Download PDF

Performance Evaluation of Desktop Videoconferencing
Mued L, Lines BL, Furnell SM, Reynolds PL
Proceedings of PG Net 2001 ? 2nd Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting, Liverpool, UK, pp13-17, 18-19 June, 2001
More details | Download PDF

Non-intrusive IP Network Performance Monitoring for TCP Flows
Ghita BV, Lines BL, Furnell SM, Ifeachor E
Proceedings of IEEE ICT2001, Bucharest, Romania, pp290-295, 4-7 June, 2001
More details | Download PDF

Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining
Singh H, Furnell SM, Lines BL, Dowland PS
Proceedings of International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security, St. Petersburg, Russia, 21-23 May, 2001
More details | Download PDF

A Conceptual Security Framework to support Continuous Subscriber Authentication in Third Generation Mobile Networks
Rodwell PM, Furnell SM, Reynolds PL
Proceedings of Euromedia 2001, Valencia, Spain, 18-20 April, 2001
More details | Download PDF

Practitioner Perception of Component Based Software Development
Phippen AD, Furnell SM, Hofmann HD
Proceedings of Euromedia 2001, Valencia, Spain, 18-20 April, 2001
More details | Download PDF

CORBA middleware services - Are they secure?
Joyce EM, Furnell SM, Reynolds PL, Sanders P
Proceedings of Euromedia 2001, Valencia, Spain, 18-20 April, 2001
More details | Download PDF

A Generic Taxonomy for Intrusion Specification and Response
Furnell SM, Magklaras GB, Papadaki M, Dowland PS
Proceedings of Euromedia 2001, Valencia, Spain, 18-20 April, 2001
More details | Download PDF

Promoting security awareness and training within small organisations
Furnell SM, Gennatou M, Dowland PS
Proceedings of the First Australian Information Security Management (AISM) Workshop, Geelong, Australia, 7 November, 2000
More details | Download PDF

An Integrated Management Architecture for Heterogeneous Networks: INSMware
Knahl MH, Bleimann U, Hofmann HD, Furnell SM
Proceedings of the IEEE Workshop on IP-oriented Operations and Management (IPOM '2000), Cracow, Poland, 4-6 September, 2000
More details | Download PDF

A conceptual intrusion monitoring architecture and thoughts on practical implementation
Dowland PS, Furnell SM
Proceedings of the World Computer Congress 2000, 21-25 August, 2000
More details | Download PDF

Management of Service Level Agreements using INSMware
Knahl MH, Furnell SM
Proceedings of the Second International Network Conference (INC 2000), Plymouth, UK, pp229-238, 3-6 July, 2000
More details | Download PDF

User authentication for keypad-based devices using keystroke analysis
Ord T, Furnell SM
Proceedings of the Second International Network Conference (INC 2000), Plymouth, UK, pp263-272, 3-6 July, 2000
More details | Download PDF

Enhancing Operating System Authentication Techniques
Dowland PS, Furnell SM
Proceedings of the Second International Network Conference (INC 2000), Plymouth, UK, pp253-261, 3-6 July, 2000
More details | Download PDF

IP Networks Performance Monitoring of Voice Flows for IP Telephony
Ghita BV, Furnell SM, Lines BL, Le Foll D, Ifeachor E
Proceedings of the Second International Network Conference (INC 2000), Plymouth, UK, pp145-155, 3-6 July, 2000
More details | Download PDF

Measurement of IP Transport Parameters for IP Telephony
Ghita BV, Furnell SM, Lines BL, Ifeachor E
Proceedings of PG Net 2000 ? 1st Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting, Liverpool, UK, pp31-36, 19-20 June, 2000
More details | Download PDF

Non-intrusive security requirements for third generation mobile systems
Rodwell PM, Furnell SM, Reynolds PL
Proceedings of PG Net 2000 ? 1st Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting, Liverpool, UK, pp7-12, 19-20 June, 2000
More details | Download PDF

Developing tools to support online distance learning
Furnell SM, Evans MP, Dowland PS
Proceedings of EUROMEDIA 2000, Antwerp, Belgium, 8-10 May, 2000
More details | Download PDF

Cyber Terrorism: The Political Evolution of the Computer Hacker
Warren MJ, Furnell SM
Proceedings of Australian Institute of Computer Ethics Conference 1999 (AICEC99), Melbourne, Australia, pp415-425, 14-16 July, 1999
NB paper has been scanned from printed copy. We apologise for the screen quality of this paper.
More details | Download PDF

A Hyper Graphics Markup Language for optimising WWW access in wireless networks
Reynolds PL, Furnell SM, Evans MP, Phippen AD
Proceedings of Euromedia 99, Munich, Germany, pp136-144, 25-28 April, 1999
More details

Security considerations in online distance learning
Furnell SM, Bleimann U, Girsang J, Röder HF, Sanders P, Stengel I
Proceedings of Euromedia 99, Munich, Germany, pp31-135, 25-28 April, 1999
More details | Download PDF

Methods of responding to healthcare security incidents
Furnell SM, Gritzalis D, Katsikas SK, Mavroudakis K, Sanders P, Warren MJ
Proceedings of MEDINFO 98, Seoul, South Korea, 18-22 August, 1998
More details | Download PDF

Integration of ATM Management Procedures into Native Integrated Network and System Management Architectures
Knahl MH, Bleimann U, Furnell SM, Sanders P
Proceedings of the first International Network Conference 1998 (INC 98), Plymouth, UK, pp91-97, 6-9 July, 1998
More details | Download PDF

Content Migration on the World Wide Web
Evans MP, Phippen AD, Müller G, Furnell SM, Sanders P, Reynolds PL
Proceedings of the first International Network Conference 1998 (INC 98), Plymouth, UK, pp156-161, 6-9 July, 1998
More details | Download PDF

Electronic Commerce : Winners and Losers
Warren MJ, Furnell SM
Proceedings of the first International Network Conference 1998 (INC 98), Plymouth, UK, pp197-202, 6-9 July, 1998
More details | Download PDF

Mobility Considerations for integrated Telecommunications Service Environments
Evans MP, Furnell SM, Phippen AD, Reynolds PL
Proceedings of IEE Sixth International Conference on Telecommunications, Edinburgh, UK, 29 March-1 April, 1998
More details | Download PDF

A Software Platform for the Integration of a Mobile Client to Intranet Services
Phippen AD, Hindle C, Furnell SM, Sanders P
Proceedings of Euromedia 98, Leicester, UK, pp177-183, 5-7 January, 1998
More details | Download PDF

Using CORBA to Support Terminal Mobility
Liljeberg M, Evans MP, Furnell SM, Maumon N, Raatikainen K, Veldkamp E, Wind BCF, Trigila S
Proceedings of TINA 97 Conference, Santiago, Chile, 17-21 November, 1997
More details | Download PDF

Internet information browsing using GSM data communications : A benchmarking study
Liljeberg M, Furnell SM, Raatikainen K, Furnell SM, Liljeberg M, Furnell SM, Raatikainen K, Furnell SM
Proceedings of ACTS Mobile Communication Summit 97, Aalborg, Denmark, vol 2, pp876-881, ISBN Number 87-985750-5-8, 7-10 October, 1997
More details

A comprehensive authentication and supervision architecture for networked multimedia systems
Furnell SM, Illingworth HM, Katsikas SK, Reynolds PL, Sanders P
Proceedings of IFIP CMS 97, Athens, Greece, pp227-238, 22-23 September, 1997
More details | Download PDF

Resource Adaptation in the TINA Service Environment
Evans MP, Phippen AD, Furnell SM, Reynolds PL
Proceedings of Fourth Communications Networks Symposium, Manchester, UK, 7-8 July, 1997
More details

Addressing information security training and awareness within the European healthcare community
Furnell SM, Sanders P, Warren MJ
Proceedings of Medical Informatics Europe 14th International Congress (MIE 97), Porto Carras, Greece, pp707-711, 25-29 May, 1997
More details | Download PDF

Addressing the problem of data security in healthcare information systems
Furnell SM, Sanders P, Warren MJ
Proceedings of HC97: Current Perspectives in Healthcare Computing 1997 Part 1, Harrogate, UK, pp55-62, 17-19 March, 1997
NB paper has been scanned from printed copy. We apologise for the screen quality of this paper.
More details | Download PDF

A Telematics Security Training Application
Furnell SM, Hill D, Rosewall I, Warren MJ
Proceedings of EUROMEDIA 96, London, UK, pp286-290, 19-21 December, 1996
More details | Download PDF

Addressing security in an Integrated Service Engineering environment
Joyce EM, Furnell SM, Reynolds PL, Sanders P
Proceedings of EUROMEDIA 96, London, UK, pp172-179, 19-21 December, 1996
More details

Non-Intrusive Security Arrangements to support Terminal and Personal Mobility
Furnell SM, Green M, Hope S, Morrissey JP, Reynolds PL
Proceedings of EUROMEDIA 96, London, UK, pp167-171, 19-21 December, 1996
More details | Download PDF

POSEIDON - A Composite Multimedia Hospital Patient Records System
Salmons NJ, Furnell SM, Sanders P, Stockel CT, Warren MJ
Proceedings of Toward An Electronic Health Record Europe ?96, London, UK, 14-17 November, 1996
More details | Download PDF

Approaches to security in healthcare multimedia systems
Furnell SM, Salmons NJ, Sanders P, Stockel CT, Warren MJ
Proceedings of IFIP TC-6 and TC-11 Joint working Conference on Communications and Multimedia Security, Essen, Germany, pp25-35, 23-24 September, 1996
More details

ODESSA - Intelligent Healthcare Security Risk Assessment
Warren MJ, Furnell SM, Sanders P
Proceedings of 2nd International Conference on Neural Networks and Expert Systems in Medicine and Healthcare (NNESMED 96), Plymouth, UK, 28-30 August, 1996
This paper is not currently available. Please refer to paper number 33 - "ODESSA - A New Approach to Healthcare Risk Analysis"
More details

Provision of healthcare security information services using the World-Wide Web
Furnell SM, Sanders P, Warren MJ
Proceedings of Medical Informatics Europe 13th International Congress (MIE 96), Copenhagen, Denmark, 19-22 August, 1996
More details

Applications of keystroke analysis for improved login security and continuous user authentication
Furnell SM, Morrissey JP, Sanders P, Stockel CT
Proceedings of 12th International Conference on Information Security (IFIP SEC ?96), Island of Samos, Greece, 21-24 May, 1996
NB paper has been scanned from printed copy. We apologise for the screen quality of this paper.
More details | Download PDF

The SEISMED Guidelines for Host Systems Secuirty
Furnell SM, Sanders P
Towards Security in Medical Telematics: Legal and Technical Aspects, B.Barber et al. (Eds), IOS Press, pp150-155, 1996
More details

Simulation of a multimedia patient records system
Salmons NJ, Furnell SM, Sanders P, Stockel CT
Proceedings of SCSC ?95 - 1995 Summer Computer Simulation Conference, Ottawa, Canada, 24-26 July, 1995
More details | Download PDF

The use of Simulation in Computer-based Security Systems
Furnell SM, Sanders P, Stockel CT
Proceedings of SCSC ?95 - 1995 Summer Computer Simulation Conference, Ottawa, Canada, 24-26 July, 1995
NB paper has been scanned from printed copy. We apologise for the screen quality of this paper.
More details | Download PDF

Security Management in the Healthcare Environment
Furnell SM, Sanders P
Proceedings of MEDINFO ?95 - 8th World Congress on Medical Informatics, Vancouver, Canada, pp675-578, 23-27 July, 1995
NB paper has been scanned from printed copy. We apologise for the screen quality of this paper.
More details | Download PDF

Secure Multimedia Systems in Healthcare and Medicine
Furnell SM, Salmons NJ, Sanders P, Stockel CT, Warren MJ
Proceedings of MEDIACOMM 95 - International Conference on Multimedia Communications, Southampton, UK, pp103-107, 11-12 April, 1995
NB paper has been scanned from printed copy. We apologise for the screen quality of this paper.
More details | Download PDF

The use of Keystroke Analysis for Continuous User Identity Verification and Supervision
Furnell SM, Sanders P, Stockel CT
Proceedings of MEDIACOMM 95 - International Conference on Multimedia Communications, Southampton, UK, pp189-193, 11-12 April, 1995
NB paper has been scanned from printed copy. We apologise for the screen quality of this paper.
More details | Download PDF

An Expert System for Health Care Data Security : A Conceptual Outline
Furnell SM, Sanders P, Stockel CT
Proceedings of NNESMED 94 - International Conference on Neural Networks & Expert Systems in Medicine and Healthcare, Plymouth, England, pp346-352, August, 1994
NB paper has been scanned from printed copy. We apologise for the screen quality of this paper.
More details | Download PDF

Data Security in Medical Information Systems using a Generic Model
Sanders P, Furnell SM
Proceedings of MIE ?93 - 11th International Congress of the European Federation for Medical Informatics, Jerusalem, Israel, pp410-414, 18-22 April, 1993
NB paper has been scanned from printed copy. We apologise for the screen quality of this paper.
More details | Download PDF

195 Conference papers

Books

E-mail Security: A Pocket Guide
Furnell SM, Dowland PS
IT Governance Publishing, ISBN: 978-1849280969, pp108, 2010
More details | External link available

Mobile Security: A Pocket Guide
Furnell SM
IT Governance Publishing, ISBN: 978-1849280204, 77pp, 2009
More details | External link available

ΚΥΒΕΡΝΟΕΓΚΛΗΜΑ (Cybercrime - Greek Edition)
Furnell SM
ΠΑΠΑΖΗΣΗΣ, ISBN: 9-600-21940-0, 397pp, 2006
More details

Computer Insecurity: Risking the System
Furnell SM
Springer, ISBN: 1-85233-943-8, 234pp, 2005
More details

Cybercrime: Vandalizing the Information Society
Furnell SM
Addison Wesley Professional, ISBN: 0-201-72159-7, 336pp, 2001
Full details here
More details

5 Books

Edited books

Information Systems Security and Privacy
Camp O, Furnell SM, Mori P
Second International Conference, ICISSP 2016, Rome, Italy, February 19-21, 2016, Springer, Revised Selected Papers, 2017
More details | External link available

Trust, Privacy and Security in Digital Business - 13th International Conference, TrustBus 2016
Katsikas SK, Lambrinoudakis C, Furnell SM
Porto, Portugal, September 7-8. Lecture Notes in Computer Science 9830, Springer, ISBN 978-3-319-44340-9 123pp, 2016
More details | External link available

Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016)
Clarke NL, Furnell SM
Frankfurt, Germany, 19-21 July, ISBN: 978-1-84102-413-4, pp313, 2016
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2015)
Furnell SM, Clarke NL
Lesvos, Greece, July 1-3, ISBN: 978-1-84102-388-5, pp295, 2015
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2014)
Clarke NL, Furnell SM
Plymouth, 8-10 July, ISBN: 978-1-84102-375-5, pp239, 2014
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the Tenth International Network Conference (INC 2014)
Dowland PS, Furnell SM, Ghita BV
Plymouth, 8-10 July, ISBN: 978-1-84102-373-1, pp197, 2014
Support independent publishing: Buy this book on Lulu.
More details | External link available

Trust, Privacy and Security in Digital Business - 10th International Conference, TrustBus 2013
Furnell SM, Lambrinoudakis C, Lopez J
Prague, Czech Republic, August 28-29, Lecture Notes in Computer Science 8058, Springer, ISBN 978-3-642-40342-2. 199pp, 2013
More details | External link available

Advances in Communications, Computing, Networks and Security Volume 10
Dowland PS, Furnell SM
Plymouth University, ISBN: 978-184102-358-8, pp229, 2013
Support independent publishing: Buy this book on Lulu.
More details | Download PDF | External link available

Proceedings of the European Information Security Multi-Conference (EISMC 2013)
Furnell SM, Clarke NL, Katos V
Lisbon, Portugal, 8-10 May, ISBN: 978-1-84102-345-8, pp153, 2013
Support independent publishing: Buy this book on Lulu.
More details | External link available

Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012
Gritzalis D, Furnell SM, Theoharidou M
Heraklion, Crete, Greece, June 4-6, 2012, IFIP Advances in Information and Communication Technology, Springer, ISBN 978-3-642-30435-4. 592pp, 2012
More details | External link available

Proceedings of the Ninth International Network Conference (INC 2012)
Botha RA, Dowland PS, Furnell SM
Port Elizabeth, South Africa, 11-12 July, ISBN: 9781841023151, pp238, 2012
Support independent publishing: Buy this book on Lulu.
More details | External link available

Advances in Communications, Computing, Networks and Security Volume 9
Dowland PS, Furnell SM
Plymouth University, ISBN: 978-184102-320-5, pp217, 2012
Support independent publishing: Buy this book on Lulu.
More details | Download PDF | External link available

Proceedings of the Sixth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2012)
Clarke NL, Furnell SM
Plymouth University, ISBN: 978-1-84102-317-5, 222pp, 2012
Support independent publishing: Buy this book on Lulu.
More details | External link available

Trust, Privacy and Security in Digital Business - 8th International Conference, TrustBus 2011
Furnell SM, Lambrinoudakis C, Pernul G
Toulouse, France, August 29 - September 2. Lecture Notes in Computer Science 6863, Springer, ISBN 978-3-642-22889-6, 223pp, 2011
More details | External link available

Advances in Communications, Computing, Networks and Security Volume 8
Dowland PS, Furnell SM
Plymouth University, ISBN: 978-1-84102-293-2, pp293, 2011
Support independent publishing: Buy this book on Lulu.
More details | Download PDF | External link available

Proceedings of the Fifth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2011)
Furnell SM, Clarke NL
University of Plymouth, ISBN: 978-1-84102-284-0, 148pp, 2011
Support independent publishing: Buy this book on Lulu.
More details | External link available

Advances in Communications, Computing, Networks and Security Volume 7
Dowland PS, Furnell SM
Plymouth University, ISBN: 978-1-84102-283-3, pp285, 2010
Support independent publishing: Buy this book on Lulu.
More details | Download PDF | External link available

Proceedings of the Eighth International Network Conference (INC 2010)
Bleimann U, Dowland PS, Furnell SM, Schneider O
Heidelberg, Germany, 8-10 July, ISBN: 978-1-84102-259-8, pp413, 2010
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the South African Information Security Multi-Conference (SAISMC 2010)
Clarke NL, Furnell SM, von Solms R
University of Plymouth, ISBN: 978-1-84102-256-7, pp291, 2010
Support independent publishing: Buy this book on Lulu.
More details | External link available

Advances in Communications, Computing, Networks and Security 6
Dowland PS, Furnell SM
University of Plymouth, ISBN: 978-1-84102-258-1, pp321, 2009
Support independent publishing: Buy this book on Lulu.
More details | Download PDF | External link available

Proceedings of the Fifth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2009)
Bleimann U, Dowland PS, Furnell SM, Grout VM
University of Plymouth, ISBN: 978-1-84102-236-9, 223pp, 2009
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the Third International Symposium on Human Aspects of Information Security & Assurance (HAISA 2009)
Furnell SM, Clarke NL
University of Plymouth, ISBN: 978-1-84102-231-4, 147pp, 2009
Support independent publishing: Buy this book on Lulu.
More details

Proceedings of the 11th IFIP TC 11.1 Working Conference on Information Security Management
Dowland PS, Furnell SM
Richmond, Virginia on 16-17 October, ISBN: 978-3-901882-31-9, pp127, 2008
Support independent publishing: Buy this book on Lulu.
More details

Advances in Communications, Computing, Networks and Security 5
Dowland PS, Furnell SM
University of Plymouth, ISBN: 978-1-84102-257-4, pp323, 2008
Support independent publishing: Buy this book on Lulu.
More details | Download PDF | External link available

Trust and Engagement in ICT Mediated Services: Understanding Public Perceptions
Lacohee H, Cofta P, Phippen AD, Furnell SM
Professional Education International (PEI), Chicago, Illinois, ISBN 978-1931695954. 350pp., 2008
More details

Trust, Privacy and Security in Digital Business
Furnell SM, Katsikas SK, Lioy A
LNCS 5185, Springer, ISBN 978-3-540-85734-1. 205pp, 2008
More details | External link available

Proceedings of the Fourth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2008)
Bleimann U, Dowland PS, Furnell SM, Grout VM
University of Plymouth, ISBN: 978-1-84102-196-6, 215pp, 2008
Support independent publishing: Buy this book on Lulu.
More details

Proceedings of the Second International Symposium on Human Aspects of Information Security & Assurance (HAISA 2008)
Clarke NL, Furnell SM
University of Plymouth, ISBN: 978-1-84102-189-8, 151pp, 2008
Support independent publishing: Buy this book on Lulu.
More details

Proceedings of the 7th International Network Conference (INC 2008)
Dowland PS, Furnell SM
University of Plymouth, ISBN: 978-1-84102-188-1, 289pp, 2008
Support independent publishing: Buy this book on Lulu.
More details | External link available

Securing Information and Communications Systems: Principles, Technologies, and Applications
Furnell SM, Katsikas SK, Lopez J, Patel A
Artech House, ISBN 978-1-59693-228-9, 289pp, 2008
More details | External link available

Advances in Networks, Computing and Communications 4
Dowland PS, Furnell SM
University of Plymouth, ISBN: 978-1-84102-180-5, pp304, 2007
Support independent publishing: Buy this book on Lulu.
More details | Download PDF | External link available

Proceedings of the International Symposium on Human Aspects of Information Security & Assurance (HAISA 2007)
Furnell SM, Clarke NL
University of Plymouth, ISBN: 978-1-84102-174-4, 178pp, 2007
Support independent publishing: Buy this book on Lulu.
More details

Proceedings of the Third Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2007)
Bleimann U, Dowland PS, Furnell SM
University of Plymouth, ISBN: 978-1-8410-2173-7, 273pp, 2007
Support independent publishing: Buy this book on Lulu.
More details

Advances in Networks, Computing and Communications 3
Dowland PS, Furnell SM
University of Plymouth, ISBN: 978-1-8410-2179-9, pp277, 2006
Support independent publishing: Buy this book on Lulu.
More details | Download PDF | External link available

Trust, Privacy, and Security in Digital Business
Fischer-Hübner S, Furnell SM, Lambrinoudakis C
Proceedings of the Third International Conference on Trust, Privacy, and Security of Digital Business (TrustBus06), LNCS 4083, Springer, ISBN 0302-9743, 246pp, 2006
More details

Proceedings of the 6th International Network Conference (INC 2006)
Furnell SM, Dowland PS
University of Plymouth, ISBN 1-84102-157-1, 428pp, 2006
Support independent publishing: Buy this book on Lulu.
More details | External link available

Security Management, Integrity, and Internal Control in Information Systems
Dowland PS, Furnell SM, Thuraisingham B, Wang XS
Springer, ISBN 0-387-29826-6. 373pp, 2005
More details

Advances in Network and Communications Engineering 2
Furnell SM, Dowland PS
University of Plymouth, ISBN: 1-84102-140-7, pp191, 2005
Support independent publishing: Buy this book on Lulu.
More details | Download PDF | External link available

Proceedings of the 5th International Network Conference (INC 2005)
Furnell SM, Dowland PS, Kormentzas G
University of the Aegean & University of Plymouth, ISBN 978-1-84102-272-7, 576pp, 2005
Support independent publishing: Buy this book on Lulu.
More details | External link available

Advances in Network and Communications Engineering
Furnell SM, Filmore P
University of Plymouth, ISBN 1-84102-118-0, 185pp, 2004
Support independent publishing: Buy this book on Lulu.
More details | Download PDF | External link available

Proceedings of the 4th International Network Conference (INC 2004)
Furnell SM, Dowland PS
University of Plymouth, ISBN 1 84102 125 3, 592pp, 2004
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the 8th Annual Scientific Conference (Euromedia 2003)
Furnell SM, Dowland PS
Eurosis, ISBN 90-77301-01-5, 222pp, 2003
More details

Proceedings of the 3rd International Network Conference (INC 2002)
Furnell SM, Dowland PS
University of Plymouth, ISBN 1-84102-105-9, 638pp, 2002
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the 2nd International Network Conference (INC 2000)
Furnell SM
University of Plymouth, ISBN 1-84102-066-4, 370pp, 2000
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the 1st International Network Conference (INC 98)
Furnell SM
University of Plymouth, ISBN 1 84102 016 8, 256pp, 1998
Support independent publishing: Buy this book on Lulu.
More details | External link available

45 Edited books

Contributions to edited books

Delay-tolerant networks (DTNs) for deep-space communications
Clarke NL, Ghita BV, Furnell SM
in "Advances In Delay-Tolerant Networks (DTNs)" Edited by J Rodrigues, ISBN: 978-0-85709-840-5, Woodhead Publishing, 298p, 2014
More details | External link available

Insider Threat Specification as a Threat Mitigation Technique
Magklaras GB, Furnell SM
in "Insider Threats in Cyber Security", Probst, Christian W.; Hunker, Jeffrey; Gollmann, Dieter (Eds.), Springer, ISBN 978-1-4419-7132-6, 244pp, 2010
More details | External link available

Securing the Human Factor
Furnell SM
in "Trust and Engagement in ICT Mediated Services: Understanding Public Perceptions", H.Lacohee, P.Cofta, A.Phippen and S.Furnell (Eds), Professional Education International (PEI), Chicago, Illinois, ISBN 978-1931695954, 350pp., 2008
More details

Security usability challenges for end-users
Furnell SM
in "Social and Human Elements of Information Security: Emerging Trends and Countermeasures". M.Gupta and R.Sharman (Eds), Information Science Reference, ISBN: 978-1-60566-036-3, pp196-219, 2008
More details

User Authentication Technologies
Clarke NL, Dowland PS, Furnell SM
in Securing Information and Communications Systems: Principles, Technologies, and Applications. S.M.Furnell, S.K.Katsikas, J.Lopez and A.Patel (Eds), Artech House, ISBN 978-1-59693-228-9, pp35-59, 2008
Available on-line.
More details

Security Concepts, Services, and Threats
Dowland PS, Furnell SM
in Securing Information and Communications Systems: Principles, Technologies, and Applications. S.M.Furnell, S.K.Katsikas, J.Lopez and A.Patel (Eds), Artech House, ISBN 978-1-59693-228-9, pp5-20, 2008
Available on-line.
More details

Malware: An Evolving Threat
Furnell SM, Ward J
in Digital Crime and Forensic Science in Cyberspace. P.Kanellis, E.Kiountouzis, N.Kolokotronis and D.Martakos (Eds)., Idea Group Publishing, Hershey PA: pp28-54, 2006
More details

E-Commerce Security
Furnell SM
in Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues. M.Warkentin and R.Vaughn (Eds), Idea Group Publishing, Hershey PA: pp131-149, 2006
More details

A Model for Managing and Migrating Web Resources
Evans MP, Furnell SM
in Best Technology Practices in Higher Education. L.Lloyd (Ed), Information Today Inc., New Jersey: pp177-192, 2005
More details

Computer hacking and cyber terrorism: the real threats in the new millennium?
Furnell SM, Warren MJ
in Cyberterrorism. A.O?Day (Ed), Ashgate Publishing, 2004
More details

Online Learning and Security
Furnell SM, Karweni T
in Towards the Virtual University: International On-Line Learning Perspectives. S.English, N.Nistor and S.Wheeler (Eds), Greenwich, CT: Information Age Publishing, 2003
More details

The ISHTAR Security Guidelines
Davey J, Furnell SM, Gaunt PN
in Implementing Secure Healthcare Telematics Applications in Europe. The ISHTAR Consortium (Eds), Technology and Informatics 66, IOS Press: pp167-180, 2001
More details

The ISHTAR World Wide Web Dissemination and Advisory Service for Healthcare Information Security
Furnell SM, Warren MJ, Evans MP
in Implementing Secure Healthcare Telematics Applications in Europe. The ISHTAR Consortium (Eds), Technology and Informatics 66, IOS Press: pp249-280, 2001
More details

Baseline Security Guidelines for Health Care Management
Sanders P, Furnell SM, Warren MJ
in Data Security in Health Care - Volume 1, Management Guidelines. The SEISMED Consortium (Eds), Technology and Informatics 31, IOS Press: pp82-107, 1996
More details

Baseline Security Guidelines for Health Care IT and Security Personnel
Sanders P, Furnell SM, Warren MJ
in Data Security in Health Care - Volume 2, Technical Guidelines. The SEISMED Consortium (Eds), Technology and Informatics 32, IOS Press: pp189-234, 1996
More details

Baseline Security Guidelines for Health Care System Users
Sanders P, Furnell SM, Warren MJ
in Data Security in Health Care - Volume 3, User Guidelines. The SEISMED Consortium (Eds), Technology and Informatics 33, IOS Press: pp78-99, 1996
More details

16 Contributions to edited books

Posters

User Behaviour with Organisational Information Security Policies
Alotaibi M, Furnell SM, Clarke NL
Proceedings of The 8th Saudi Students Conference, January 31 - February 1, 2015
More details | Download PDF | External link available

A Framework of User Identification From Network Traffic
Alotibi G, Clarke NL, Furnell SM, Li F
Proceedings of The 8th Saudi Students Conference, January 31 - February 1, 2015
More details | Download PDF

A Review of Cloud Forensics issues, solutions & open problems
Alqahtany S, Clarke NL, Furnell SM
Proceedings of The 8th Saudi Students Conference, January 31 - February 1, 2015
More details | Download PDF | External link available

Using a "Chinese Wall" for Anonymous Recommendation and the Protection of Privacy
Schilke SW, Bleimann U, Furnell SM, Phippen AD
Poster presentation at Tag der Forschung, Fachhochschule Darmstadt, Germany, 25th October, 2005
More details | Download PDF

Multi-Dimensional-Personalisation
Schilke SW, Bleimann U, Furnell SM, Phippen AD
Poster presentation at Tag der Forschung, Fachhochschule Darmstadt, Germany, 19th October, 2004
More details | Download PDF

Enhancing Intrusion Response in Networked System
Papadaki M, Furnell SM, Dowland PS, Lines BL, Reynolds PL
Poster presentation at Britain's Younger Engineers in 2002, House of Commons, London, 9 December, 2002
More details | Download PDF

Non-Intrusive Biometric Authentication for Mobile Devices
Clarke NL, Furnell SM, Reynolds PL, Rodwell PM
Poster presentation at Biometrics 2002, Excel Center, London, UK, 6-8 November, 2002
Recipient of Best Student Prize
More details | Download PDF

Non-Intrusive Subscriber Authentication for 3G Mopbile System
Clarke NL, Dowland PS, Furnell SM, Reynolds PL, Rodwell PM
Poster presentation at Britain's Younger Engineers in 2001, House of Commons, London, 3 December, 2001
More details | Download PDF

Advanced Authentication and Intrusion Detection Technologies
Dowland PS, Furnell SM, Magklaras GB, Papadaki M, Reynolds PL, Rodwell PM, Singh H
Poster presentation at Britain's Younger Engineers in 2000, House of Commons, London, 4 December, 2000
More details | Download PDF

9 Posters

Internal publications

Assessing the Feasibility of Security Metrics
Heinzle B, Furnell SM
Advances in Communications, Computing, Networks and Security Volume 10, ISBN: 978-1-84102-358-8, pp88-95, 2013
Can be ordered on-line.
More details | Download PDF

Factors Affecting Information Security Behaviour
Rajendran A, Furnell SM, Gabriel T
Advances in Communications, Computing, Networks and Security Volume 9, ISBN: 978-1-84102-320-5, pp42-49, 2012
Can be ordered on-line.
More details | Download PDF

Improving the Usability of Security Features within Tools and Applications
Heeren C, Furnell SM
Advances in Communications, Computing, Networks and Security Volume 8, ISBN: 978-1-84102-293-2, pp137-145, 2011
Can be ordered on-line.
More details | Download PDF

Security Culture in the Context of National Culture
Thomas J, Furnell SM
Advances in Communications, Computing, Networks and Security Volume 8, ISBN: 978-1-84102-293-2, pp106-116, 2011
Can be ordered on-line.
More details | Download PDF

Improving the Usability of Security Features in Tools and Applications
Rangarajan B, Furnell SM
Advances in Communications, Computing, Networks and Security Volume 8, ISBN: 978-1-84102-293-2, pp97-105, 2011
Can be ordered on-line.
More details | Download PDF

Personality Type – A Valid Indicator of Security Champions?
Gabriel T, Furnell SM, Thomson KL
Advances in Communications, Computing, Networks and Security Volume 8, ISBN: 978-1-84102-293-2, pp68-75, 2011
Can be ordered on-line.
More details | Download PDF

Attack Vectors to Wireless ZigBee Network Communications - Analysis and Countermeasures
Markert J, Massoth M, Fischer KP, Furnell SM, Bolan C
Proceedings of the Seventh Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2011), Furtwangen, Germany, ISBN: 978-1-84102-295-6, pp57-66, 2011
Can be ordered on-line.
More details | Download PDF | External link available

Implementing CSR-related KPIs into Business Intelligence Landscapes
Alxneit T, Knahl MH, Frey-Luxemburger M, Furnell SM
Proceedings of the Seventh Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2011), Furtwangen, Germany, ISBN: 978-1-84102-295-6, pp1-11, 2011
Can be ordered on-line.
More details | Download PDF | External link available

Comparing Anti-Spyware Products
Martins W, Furnell SM
Advances in Communications, Computing, Networks and Security Volume 7, ISBN: 978-1-84102-283-3, pp167-174, 2010
Can be ordered on-line.
More details | Download PDF

Improving User Awareness of Social Engineering
Newbould M, Furnell SM
Advances in Communications, Computing, Networks and Security Volume 7, ISBN: 978-1-84102-283-3, pp159-166, 2010
Can be ordered on-line.
More details | Download PDF

Online Security: Strategies for Promoting Home User Awareness
Varghese B, Furnell SM
Advances in Communications, Computing, Networks and Security Volume 7, ISBN: 978-1-84102-283-3, pp124-131, 2010
Can be ordered on-line.
More details | Download PDF

Accessing Spyware Awareness and Defences amongst Security Administrators
Koliarou M, Furnell SM
Advances in Communications, Computing, Networks and Security Volume 7, ISBN: 978-1-84102-283-3, pp53-58, 2010
Can be ordered on-line.
More details | Download PDF

Internet User’s Awareness and Understanding of Spyware and Anti-Spyware
Alshamrani M, Furnell SM
Advances in Communications, Computing, Networks and Security Volume 7, ISBN: 978-1-84102-283-3, pp20-28, 2010
Can be ordered on-line.
More details | Download PDF

Agile Limitations and Model-Driven Opportunities for Software Development Projects
Mairon K, Buchheit M, Knahl MH, Atkinson S, Furnell SM, Schreier U
Proceedings of the Sixth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2010), Plymouth, UK, ISBN: 978-1-84102-269-7, pp43-51, 2010
Can be ordered on-line.
More details | Download PDF

Towards a Classification of Information Technology Governance Frameworks
Krey M, Harriehausen-Mühlbauer B, Knoll M, Furnell SM
Proceedings of the Sixth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2010), Plymouth, UK, ISBN: 978-1-84102-269-7, pp31-41, 2010
Can be ordered on-line.
More details | Download PDF

Evaluating the Effects of Security Usability Improvements in Word 2007
Helala M, Furnell SM
Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp277-284, 2009
Can be ordered on-line.
More details | Download PDF

An Assessment of Security Advisory Website
Thomas J, Furnell SM
Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp152-159, 2009
Can be ordered on-line.
More details | Download PDF

Internet Security: A View from ISPs and Retailers
Shams R, Furnell SM
Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp135-143, 2009
Can be ordered on-line.
More details | Download PDF

Assessing the Usability of Security Features in Tools and Applications
Moustafa F, Furnell SM
Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp98-106, 2009
Can be ordered on-line.
More details | Download PDF

Improving the Usability of Security Features - a Survey of End Users
Adjei MO, Furnell SM
Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp3-11, 2009
Can be ordered on-line.
More details | Download PDF

Online Gaming: An Emerging Avenue for Exploitation?
Sanders B, Dowland PS, Furnell SM
Proceedings of the Fifth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2009), Darmstadt, Germany, ISBN: 978-1-84102-236-9, pp29-42, 2009
Can be ordered on-line.
More details | Download PDF

Response Mechanisms for Intrusion Response Systems (IRSs)
Anuar NB, Furnell SM, Papadaki M, Clarke NL
Proceedings of the Fifth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2009), Darmstadt, Germany, ISBN: 978-1-84102-236-9, pp3-14, 2009
Can be ordered on-line.
More details | Download PDF

Assessing Protection and Security Awareness amongst Home Users
Tsaganidi V-G, Furnell SM
Advances in Communications, Computing, Networks and Security 5, ISBN: 978-1-84102-257-4, pp303-312, 2008
Can be ordered on-line.
More details | Download PDF

Analysing the Extent that Children are Made Aware of Internet Security Issues Within UK Schools
Richardson BA, Furnell SM
Advances in Communications, Computing, Networks and Security 5, ISBN: 978-1-84102-257-4, pp293-302, 2008
Can be ordered on-line.
More details | Download PDF

Evolution of Wi-Fi and Security Issues
Zaman A, Furnell SM
Advances in Communications, Computing, Networks and Security 5, ISBN: 978-1-84102-257-4, pp210-217, 2008
Can be ordered on-line.
More details | Download PDF

Cyber Terrorism – Electronic Activism and the Potential Threat to the United Kingdom
Wareham A, Furnell SM
Advances in Communications, Computing, Networks and Security 5, ISBN: 978-1-84102-257-4, pp172-180, 2008
Can be ordered on-line.
More details | Download PDF

Online Security: Strategies for Promoting User Awareness
Vikharuddin M, Furnell SM
Advances in Communications, Computing, Networks and Security 5, ISBN: 978-1-84102-257-4, pp162-171, 2008
Can be ordered on-line.
More details | Download PDF

Multi Dimensional Personalisation Architecture Proposal for a Prototype
Schilke SW, Bleimann U, Furnell SM, Phippen AD
Proceedings of the Fourth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2008), Wrexham, UK, ISBN: 978-1-84102-196-6, pp121-133, 2008
Can be ordered on-line.
More details | Download PDF

A Survey of User Opinions and Preference Towards Graphical Authentication
Jali MZ, Furnell SM, Dowland PS, Reid F
Proceedings of the Fourth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2008), Wrexham, UK, ISBN: 978-1-84102-196-6, pp11-20, 2008
Can be ordered on-line.
More details | Download PDF

Strengthening the Human Firewall
Tjhai GC, Furnell SM
Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp222-230, 2007
Can be ordered on-line.
More details | Download PDF

User security awareness of social engineering and phishing
Karakasiliotis A, Furnell SM, Papadaki M
Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp191-198, 2007
Can be ordered on-line.
More details | Download PDF

Improving protection and security awareness amongst home users
Bryant P, Furnell SM, Phippen AD
Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp182-190, 2007
Can be ordered on-line.
More details | Download PDF

Security Technologies: Why are they not used correctly?
Al-Tawqi M, Furnell SM
Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp164-172, 2007
Can be ordered on-line.
More details | Download PDF

Public awareness of biometrics
Evangelatos K, Furnell SM
Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp51-59, 2007
Can be ordered on-line.
More details | Download PDF

User Awareness of Biometrics
Edmonds BJ, Furnell SM
Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp30-37, 2007
Can be ordered on-line.
More details | Download PDF

Recording end-users security events: A step towards increasing usability
Chatziapostolou D, Furnell SM
Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp11-18, 2007
Can be ordered on-line.
More details | Download PDF

New architecture for a centralized next generation profile register in future mobile telecommunication networks
Diehl A, Fuhrmann W, Bleimann U, Reynolds PL, Furnell SM
Proceedings of the Third Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2007), Plymouth, UK, ISBN: 978-1-8410-2173-7, pp215-229, 2007
Can be ordered on-line.
More details | Download PDF

Security-relevance of semantic patterns in cross-organisational business processes using WS-BPEL
Fischer KP, Bleimann U, Fuhrmann W, Furnell SM
Proceedings of the Third Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2007), Plymouth, UK, ISBN: 978-1-8410-2173-7, pp67-80, 2007
Can be ordered on-line.
More details | Download PDF

Prerequisites for monitoring insider IT misuse
Phyo AH, Furnell SM, Phippen AD
Proceedings of the Third Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2007), Plymouth, UK, ISBN: 978-1-8410-2173-7, pp41-52, 2007
Can be ordered on-line.
More details | Download PDF

Device versus network-centric authentication models for mobile devices – operational and perceptual trade-offs
Karatzouni S, Clarke NL, Furnell SM
Proceedings of the Third Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2007), Plymouth, UK, ISBN: 978-1-8410-2173-7, pp23-39, 2007
Can be ordered on-line.
More details | Download PDF

Multi-dimensional-personalisation - in “whom” we trust? Perception of trust & privacy
Schilke SW, Bleimann U, Furnell SM, Phippen AD
Proceedings of the Third Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2007), Plymouth, UK, ISBN: 978-1-8410-2173-7, pp11-22, 2007
Can be ordered on-line.
More details | Download PDF

Uses and dangers of peer-to-peer and instant messaging in a business environment
Quaden T, Furnell SM, Papadaki M, Pinkney G
Advances in Network & Communication Engineering 3, pp203-211, 2006
Can be ordered on-line.
More details | Download PDF

Changing Trends in Vulnerability Discovery
Tope SW, Furnell SM, Papadaki M, Pinkney G
Advances in Network & Communication Engineering 3, pp193-202, 2006
Can be ordered on-line.
More details | Download PDF

Social Engineering: A growing threat, with diverging directions
Chelleth JV, Furnell SM, Papadaki M, Pinkney G, Dowland PS
Advances in Network & Communication Engineering 3, pp179-184, 2006
Can be ordered on-line.
More details | Download PDF

Attack Pattern Analysis: Trends in Malware Variant Development
Abu-Bakar UA, Furnell SM, Papadaki M, Pinkney G
Advances in Network & Communication Engineering 3, pp90-99, 2006
Can be ordered on-line.
More details | Download PDF

Authentication based upon secret knowledge and its resilience to impostors
Zekri L, Furnell SM
Advances in Network & Communication Engineering 3, pp30-38, 2006
Can be ordered on-line.
More details | Download PDF

Security Usability: A Survey of End-Users
Jusoh A, Furnell SM, Katsabas D
Advances in Network & Communication Engineering 3, pp3-9, 2006
Can be ordered on-line.
More details | Download PDF

Survey of Wireless Access Point Security in Plymouth
Voisin M, Ghita BV, Furnell SM
Advances in Network & Communication Engineering 2, pp85-92, 2005
More details

World Wide Web Content Study Based on Anonymised Network Traces
Salama E, Ghita BV, Furnell SM
Advances in Network & Communication Engineering 2, pp74-84, 2005
More details

The Interaction Between Mobile IPv6 and Firewalls
Ghashash L, Furnell SM, Akram A, Ghita BV
Advances in Network & Communication Engineering 2, pp66-73, 2005
More details

Security Technologies for a Virtual University
Ruiz VC, Furnell SM, Phippen AD
Advances in Network & Communication Engineering 2, pp57-65, 2005
More details

ISEduT: An Educational Tool for Information Security
Sharfaei S, Furnell SM
Advances in Network & Communication Engineering 2, pp49-56, 2005
More details

Approaches to Establishing IT Security Culture
Langue C, Furnell SM, Dowland PS
Advances in Network & Communication Engineering 2, pp43-48, 2005
More details

IT Security: A Human Computer Interaction Perspective
Katsabas D, Furnell SM, Phippen AD
Advances in Network & Communication Engineering 2, pp35-42, 2005
More details | Download PDF

IT Risk Analysis for Small and Medium Enterprises
Kritharas I, Dimopoulos V, Furnell SM
Advances in Network & Communication Engineering 2, pp27-34, 2005
More details

Passimages : An Alternative Method of User Authentication
Charruau D, Furnell SM, Dowland PS
Advances in Network & Communication Engineering 2, pp3-10, 2005
More details

Assessing Global Internet Accessibility
Alharbi MA, Furnell SM, Ghita BV
Advances in Network & Communication Engineering, pp81-89, 2004
More details

EduCQ : An Educational Tool for Information Security
Larchevêque B, Furnell SM
Advances in Network & Communication Engineering, pp72-80, 2004
More details

Privacy Implications of Network Monitoring
Periasamy V, Ghita BV, Furnell SM
Advances in Network & Communication Engineering, pp63-71, 2004
More details

Analysis of insider misuse in commercial applications
Portilla F, Furnell SM, Phyo AH
Advances in Network & Communication Engineering, pp46-54, 2004
More details

A Generic Framework for the Prevention and Detection of Insider Misuse
Coussa MJ, Phyo AH, Furnell SM
Advances in Network & Communication Engineering, pp38-45, 2004
More details

Security Analysis Tools - Do They Make Any Difference?
Bolakis S, Furnell SM, Dowland PS
Advances in Network & Communication Engineering, pp29-37, 2004
More details

Artificial Impostor Profiling for Keystroke Analysis on a Mobile Handset
Lecomte J, Clarke NL, Furnell SM
Advances in Network & Communication Engineering, pp55-62, 2004
More details | Download PDF

63 Internal publications

Technical articles

Social Engineering: Exploiting the Weakest Links
Papadaki M, Furnell SM, Dodge RC
Whitepaper, European Network & Information Security Agency (ENISA), October, 2008
More details | External link available

1 Technical articles

458 publication(s) - all categories.