Steven Furnell
Orcid: 0000-0003-0984-7542Affiliations:
- University of Nottingham, UK
- Plymouth University, Centre for Security, Communications and Network Research (former)
According to our database1,
Steven Furnell
authored at least 268 papers
between 1995 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
On csauthors.net:
Bibliography
2025
Cybersecurity behavior change: A conceptualization of ethical principles for behavioral interventions.
Comput. Secur., 2025
2024
Future Internet, September, 2024
Future Internet, August, 2024
User perception of Context-Based Micro-Training - a method for cybersecurity training.
Inf. Secur. J. A Glob. Perspect., March, 2024
Enabling Vehicle-to-Vehicle Trust in Rural Areas: An Evaluation of a Pre-Signature Scheme for Infrastructure-Limited Environments.
Future Internet, March, 2024
Situational support and information security behavioural intention: a comparative study using conservation of resources theory.
Behav. Inf. Technol., February, 2024
Proceedings of the ICT Systems Security and Privacy Protection, 2024
Proceedings of the Information Security Education - Challenges in the Digital Age, 2024
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2024
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2024
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2024
Towards a Harmonised Approach for Security and Privacy Management in Smart Home Contexts.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2024
The Influence of Human Factors on Adaptive Social Media Cybersecurity Training and Education.
Proceedings of the Human Aspects of Information Security and Assurance, 2024
Proceedings of the Human Aspects of Information Security and Assurance, 2024
Proceedings of the Human Aspects of Information Security and Assurance, 2024
Proceedings of the Human Aspects of Information Security and Assurance, 2024
Proceedings of the Human Aspects of Information Security and Assurance, 2024
Proceedings of the European Interdisciplinary Cybersecurity Conference, 2024
Proceedings of the IEEE Global Engineering Education Conference, 2024
2023
J. Inf. Secur. Appl., December, 2023
Proceedings of the Trust Management XIV, 2023
Assessing the Impact of Attacks on Connected and Autonomous Vehicles in Vehicular Ad Hoc Networks.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2023
Supporting Small and Medium-Sized Enterprises in Using Privacy Enhancing Technologies.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2023
Assessing User Understanding, Perception and Behaviour with Privacy and Permission Settings.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2023
Evaluating the Risks of Human Factors Associated with Social Media Cybersecurity Threats.
Proceedings of the Human Aspects of Information Security and Assurance, 2023
Proceedings of the Human Aspects of Information Security and Assurance, 2023
Proceedings of the Human Aspects of Information Security and Assurance, 2023
Proceedings of the Human Aspects of Information Security and Assurance, 2023
Proceedings of the Human Aspects of Information Security and Assurance, 2023
Automatically Labeling Cyber Threat Intelligence reports using Natural Language Processing.
Proceedings of the ACM Symposium on Document Engineering 2023, 2023
2022
Motivating Information Security Policy Compliance: Insights from Perceived Organizational Formalization.
J. Comput. Inf. Syst., 2022
Future Internet, 2022
Comput. Secur., 2022
Comput. Secur., 2022
Collaborative Cybersecurity Learning: Establishing Educator and Learner Expectations and Requirements.
Proceedings of the Information Security Education - Adapting to the Fourth Industrial Revolution, 2022
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
Evaluating Consumer Understanding and Awareness of Connected and Autonomous Vehicle Data Privacy.
Proceedings of the Information Systems Security and Privacy, 2022
Benchmarking Consumer Data and Privacy Knowledge in Connected and Autonomous Vehicles.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2022
COLTRANE - Towards a Methodology and Platform Supported Educational Basis for Cybersecurity Education.
Proceedings of the Human Aspects of Information Security and Assurance, 2022
Proceedings of the IEEE European Symposium on Security and Privacy, 2022
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022
2021
Proceedings of the Advancing Research in Information and Communication Technology, 2021
Exploring touch-based behavioral authentication on smartphone email applications in IoT-enabled smart cities.
Pattern Recognit. Lett., 2021
J. Inf. Secur. Appl., 2021
Inf. Comput. Secur., 2021
A novel approach for improving information security management and awareness for home environments.
Inf. Comput. Secur., 2021
Comput. Secur., 2021
Comput. Secur., 2021
Grano-GT: A granular ground truth collection tool for encrypted browser-based Internet traffic.
Comput. Networks, 2021
Proceedings of the Information Security Education for Cyber Resilience, 2021
Proceedings of the Universal Access in Human-Computer Interaction. Design Methods and User Experience, 2021
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
2020
Comparing the protection and use of online personal information in South Africa and the United Kingdom in line with data protection requirements.
Inf. Comput. Secur., 2020
Privacy risk and the use of Facebook Apps: A gender-focused vulnerability assessment.
Comput. Secur., 2020
Comput. Secur., 2020
Proceedings of the Information Security Education. Information Security in Action, 2020
Proceedings of the 6th IEEE International Conference on Collaboration and Internet Computing, 2020
2019
Information security burnout: Identification of sources and mitigating factors from security demands and resources.
J. Inf. Secur. Appl., 2019
Inf. Comput. Secur., 2019
Identity-as-a-Service: An Adaptive Security Infrastructure and Privacy-Preserving User Identity for the Cloud Environment.
Future Internet, 2019
Deterrence and prevention-based model to mitigate information security insider threats in organisations.
Future Gener. Comput. Syst., 2019
Ad Hoc Networks, 2019
Proceedings of the 2019 International Symposium on Networks, Computers and Communications, 2019
Proceedings of the Information Security Education. Education in Proactive Information Security, 2019
A Novel Behaviour Profiling Approach to Continuous Authentication for Mobile Applications.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance, 2019
Organizational formalization and employee information security behavioral intentions based on an extended TPB model.
Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services, 2019
Proceedings of the International Conference on Advanced Communication Technologies and Networking, 2019
Proceedings of the Third Central European Cybersecurity Conference, 2019
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019
2018
Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks.
IEEE Trans. Netw. Serv. Manag., 2018
Inf. Secur. J. A Glob. Perspect., 2018
Inf. Comput. Secur., 2018
Proceedings of the Trust, Privacy and Security in Digital Business, 2018
Proceedings of the Information Security Education - Towards a Cybersecure Society, 2018
Personalising Security Education: Factors Influencing Individual Awareness and Compliance.
Proceedings of the Information Systems Security and Privacy - 4th International Conference, 2018
Enhancing Security Education - Recognising Threshold Concepts and Other Influencing Factors.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018
2017
Comput. Secur., 2017
Comput. Secur., 2017
Toward an Automatic Classification of Negotiation Styles Using Natural Language Processing.
Proceedings of the Intelligent Virtual Agents - 17th International Conference, 2017
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
A comperhansive framework for cultivating and assessing Information Security Culture .
Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance, 2017
Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
Inf. Secur. J. A Glob. Perspect., 2016
Int. J. Mob. Comput. Multim. Commun., 2016
Int. J. Cyber Situational Aware., 2016
Digit. Investig., 2016
Continuous and transparent multimodal authentication: reviewing the state of the art.
Clust. Comput., 2016
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016
Proceedings of the 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), 2016
A Forensic Acquisition and Analysis System for IaaS: Architectural Model and Experiment.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
Kybernetes, 2015
Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions.
J. Netw. Comput. Appl., 2015
J. Cloud Comput., 2015
Inf. Secur. J. A Glob. Perspect., 2015
IEEE Commun. Surv. Tutorials, 2015
Comput. Secur., 2015
Proceedings of the Trust, Privacy and Security in Digital Business, 2015
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015
Proceedings of the Information Systems Security and Privacy, 2015
An Identification of Variables Influencing the Establishment of Information Security Culture.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015
2014
A response selection model for intrusion response systems: Response Strategy Model (RSM).
Secur. Commun. Networks, 2014
Investigating the Viability of Multifactor Graphical Passwords for User Authentication.
Inf. Secur. J. A Glob. Perspect., 2014
Performance evaluation of a Technology Independent Security Gateway for Next Generation Networks.
Proceedings of the IEEE 10th International Conference on Wireless and Mobile Computing, 2014
Proceedings of the ICT Systems Security and Privacy Protection, 2014
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014
2013
Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM).
Secur. Commun. Networks, 2013
Mob. Networks Appl., 2013
An Expert Panel Approach on Developing a Unified System Authentication Benchmarking Index.
Int. J. Interdiscip. Telecommun. Netw., 2013
Comput. Secur., 2013
Proceedings of the Trust, Privacy, and Security in Digital Business, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Challenges to digital forensics: A survey of researchers & practitioners attitudes and opinions.
Proceedings of the 2013 Information Security for South Africa, 2013
Proceedings of the Information Assurance and Security Education and Training, 2013
Essential Lessons Still Not Learned? Examining the Password Practices of End-Users and Service Providers.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2013
Proceedings of the 19th Americas Conference on Information Systems, 2013
2012
Comput. Secur., 2012
Proceedings of the Wired/Wireless Internet Communication - 10th International Conference, 2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the Ninth International Network Conference (INC 2012), 2012
Approach to the Evaluation of a Method for the Adoption of Information Technology Governance, Risk Management and Compliance in the Swiss Hospital Environment.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012
2011
Int. J. Mob. Comput. Multim. Commun., 2011
Int. J. Inf. Technol. Syst. Approach, 2011
Int. J. Digit. Crime Forensics, 2011
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011
Proceedings of the 5th International Conference on Network and System Security, 2011
Proceedings of the 5th International Symposium on Human Aspects of Information Security and Assurance, 2011
Proceedings of the 7th International Conference on Information Assurance and Security, 2011
2010
Proceedings of the Insider Threats in Cyber Security, 2010
Netw. Secur., 2010
Online Addiction: A Cultural Comparison of Privacy Risks in Online Gaming Environments.
J. Multim. Process. Technol., 2010
Inf. Manag. Comput. Secur., 2010
A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm.
Comput. Secur., 2010
Proceedings of the 12th UKSim, 2010
Proceedings of the Trust, 2010
Proceedings of the MEDES '10: International ACM Conference on Management of Emergent Digital EcoSystems, 2010
An investigation and survey of response options for Intrusion Response Systems (IRSs).
Proceedings of the Information Security South Africa Conference 2010, 2010
Psycho-Analytical Considerations in Internet Marketing - Focusing on Human Needs And Personal Trust.
Proceedings of the Eighth International Network Conference (INC 2010), 2010
Implications and Risks of MMORPG Addiction: Motivations, Emotional Investment, Problematic Usage and Personal Privacy.
Proceedings of the South African Information Security Multi-Conference, 2010
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010
Proceedings of the ARES 2010, 2010
2009
Trans. Large Scale Data Knowl. Centered Syst., 2009
Inf. Manag. Comput. Secur., 2009
Proceedings of the Emerging Challenges for Security, 2009
Proceedings of the Information Assurance and Security Education and Training, 2009
Proceedings of the 3rd International Conference on Human Aspects of Information Security and Assurance, 2009
Proceedings of the 3rd International Conference on Human Aspects of Information Security and Assurance, 2009
Proceedings of the 3rd International Conference on Human Aspects of Information Security and Assurance, 2009
2008
Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks.
Ad Hoc Networks, 2008
Proceedings of the Trust, 2008
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
Proceedings of the 2nd International Conference on Human Aspects of Information Security and Assurance, 2008
2007
J. Comput. Virol., 2007
Analysis of security-relevant semantics of BPEL in cross-domain defined business processes.
Inf. Manag. Comput. Secur., 2007
Special issue: TrustBus 2006.
Comput. Syst. Sci. Eng., 2007
A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head.
Comput. Secur., 2007
Pre-execution Security Policy Assessment of Remotely Defined BPEL-Based Grid Processes.
Proceedings of the Trust, 2007
Proceedings of the New Approaches for Security, 2007
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 6th International Conference, 2007
2006
Inf. Manag. Comput. Secur., 2006
Inf. Manag. Comput. Secur., 2006
Comput. Secur., 2006
Comput. Secur., 2006
Proceedings of the Security and Privacy in Dynamic Environments, 2006
A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks - A Friend Approach.
Proceedings of the Intelligence and Security Informatics, 2006
2005
Inf. Secur. Tech. Rep., 2005
Inf. Manag. Comput. Security, 2005
A preliminary model of end user sophistication for insider threat prediction in IT systems.
Comput. Secur., 2005
Comput. Secur., 2005
A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005
2004
Internet Res., 2004
Inf. Manag. Comput. Secur., 2004
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004
A Long-term Trial of Keystroke Profiling using Digraph, Trigraph and Keyword Latencies.
Proceedings of the Security and Protection in Information Processing Systems, 2004
Proceedings of the IT Innovation for Adaptability and Competitiveness, 2004
Proceedings of the Information Security Management, Education and Privacy, 2004
Approaches to IT Security in Small and Medium Enterprises.
Proceedings of the 2nd Australian Information Security Management Conference, 2004
2003
Inf. Manag. Comput. Secur., 2003
Using Keystroke Analysis as a Mechanism for Subscriber Authentication on Mobile Handsets.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
Improving Security Awareness Through Computer-based Training.
Proceedings of the Security Education and Critical Infrastructures, 2003
Proceedings of the Web Engineering, International Conference, 2003
Proceedings of the Communications and Multimedia Security, 2003
2002
Inf. Manag. Comput. Secur., 2002
Comput. Secur., 2002
Comput. Secur., 2002
Proceedings of the Eleventh International World Wide Web Conference, 2002
Keystroke Analysis as a Method of Advanced User Authentication and Response.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002
Addressing Internet Security Vulnerabilities: A Benchmarking Study.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002
2001
Inf. Manag. Comput. Secur., 2001
Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining.
Proceedings of the Information Assurance in Computer Networks: Methods, 2001
Security Vulnerabilities and System Intrusions - The Need for Automatic Response Frameworks.
Proceedings of the Advances in Information Security Management & Small Systems Security, 2001
2000
Internet Res., 2000
Inf. Manag. Comput. Secur., 2000
1999
Internet Res., 1999
Comput. Secur., 1999
Comput. Secur., 1999
1998
Proceedings of the MEDINFO '98, 1998
A Software Platform for the Integration of a Mobile Client to Intranet Services.
Proceedings of the EUROMEDIA 1998 featuring WEBTEC-MEDIATEC-COMTEC-APTEC, 1998
1997
ODESSA - a new approach to healthcare risk analysis.
Proceedings of the Information Security in Research and Business, 1997
Proceedings of the Intelligence in Services and Networks: Technology for Cooperative Competition, 1997
1996
Proceedings of the Data Security for Health Care - Volume I: Management Guidelines, 1996
Proceedings of the Towards Security in Medical Telematics - Legal and Technical Aspects, 1996
Applications of keystroke analysis for improved login security and continuous user authentication.
Proceedings of the Information Systems Security, 1996
Addressing Security in an Integrated Service Engineering Environment.
Proceedings of the EUROMEDIA 1996 featuring WEBTEC-MEDIATEC-COMTEC-APTEC, 1996
A Telematics Security Training Application.
Proceedings of the EUROMEDIA 1996 featuring WEBTEC-MEDIATEC-COMTEC-APTEC, 1996
Non-Intrusive Security Arrangements to Support Terminal and Personal Mobility.
Proceedings of the EUROMEDIA 1996 featuring WEBTEC-MEDIATEC-COMTEC-APTEC, 1996
Approaches to Security in Healthcare Multimedia Systems.
Proceedings of the Communications and Multimedia Security II, 1996
1995