Top of page

Student/Staff Portal
Global Site Navigation

School of Science

Local Section Navigation
You are here: Main Content

Dr Steven Furnell

Adjunct Professor

Staff Member Details
Email: s.furnell@ecu.edu.au

Research Outputs

Journal Articles

  • Hong, Y., Furnell, S. (2022). Motivating Information Security Policy Compliance: Insights from Perceived Organizational Formalization. Journal of Computer Information Systems, 62(1), 19-28. https://doi.org/10.1080/08874417.2019.1683781.

Book Chapters

  • Furnell, S., Haskell-Dowland, P., Agrawal, M., Baskerville, R., Basu, A., Bishop, M., Cuellar, J., Foresti, S., Futcher, L., Gal-Oz, N., Herath, T., Jensen, CD., Johnston, A., Joosen, W., Livraga, G., Lopez, J., Marsh, S., Martinelli, F., Massacci, F., Pasic, A., Schinagl, S., Shahim, A., Thomson, K., Vaidya, J., Vance, T., Warkentin, M. (2021). Information Security and Privacy – Challenges and Outlook. Advancing Research in Information and Communication Technology (383-401). Springer. https://doi.org/10.1007/978-3-030-81701-5_16.

Journal Articles

  • Alotaibi, F., Clarke, N., Furnell, S. (2021). A novel approach for improving information security management and awareness for home environments. Information and Computer Security, 29(1), 25-48. https://doi.org/10.1108/ICS-05-2020-0073.

Conference Publications

  • Herkanaidu, R., Furnell, S., Papadaki, M. (2020). Towards a Cross-Cultural Education Framework for Online Safety Awareness. Human Aspects of Information Security and Assurance 14th IFIP WG 11.12 International Symposium, HAISA 2020 Mytilene, Lesbos, Greece, July 8–10, 2020 Proceedings (47-57). Springer. https://doi.org/10.1007/978-3-030-57404-8_4.
  • Furnell, S., Bishop, M. (2020). Education for the Multifaith Community of Cybersecurity. IFIP Advances in Information and Communication Technology (32-45). Springer. https://doi.org/10.1007/978-3-030-59291-2_3.
  • Furnell, S., Haskell-Dowland, P. (2020). Good guidance or mistaken misdirection: Assessing the quality of password advice. Annual Information Institute Conference Proceedings (1-9). Information Institute. https://ro.ecu.edu.au/ecuworkspost2013/8242.

Conference Publications

  • Altamimi, A., Clarke, N., Furnell, S., Li, F. (2019). Multi-platform authorship verification. CECC 2019: Proceedings of the Third Central European Cybersecurity Conference (article number a13). ACM. https://doi.org/10.1145/3360664.3360677.
  • Furnell, S., Alotaibi, F., Esmael, R. (2019). Aligning security practice with policy: Guiding and nudging towards better behavior. Proceedings of the Annual Hawaii International Conference on System Sciences (5618-5627). IEEE Computer Society. https://ro.ecu.edu.au/ecuworkspost2013/11320.
  • Alohali, M., Clarke, N., Furnell, S. (2019). Information security risk communication: A user-centric approach. 16th ACS/IEEE International Conference on Computer Systems and Applications AICCSA 2019 (article number 9035361). IEEE Computer Society. https://doi.org/10.1109/AICCSA47632.2019.9035361.
  • Hong, Y., Furnell, S. (2019). Organizational formalization and employee information security behavioral intentions based on an extended TPB model. 2019 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2019 (Article number 8885405). IEEE. https://doi.org/10.1109/CyberSecPODS.2019.8885405.
  • Tolah, A., Furnell, S., Papadaki, M. (2019). A Comprehensive Framework for Understanding Security Culture in Organizations. Information Security Education. Education in Proactive Information Security 12th IFIP WG 11.8 World Conference, WISE 12, Lisbon, Portugal, June 25–27, 2019, Proceedings (143-156). Springer. https://doi.org/10.1007/978-3-030-23451-5_11.
  • Alotaibi, S., Alruban, A., Furnell, S., Clarke, N. (2019). A novel behaviour profiling approach to continuous authentication for mobile applications. ICISSP 2019 - Proceedings of the 5th International Conference on Information Systems Security and Privacy 2019 (246-251). SciTePress. https://ro.ecu.edu.au/ecuworkspost2013/6110.

Journal Articles

  • Alohali, M., Clarke, N., Furnell, S. (2018). The design and evaluation of a user-centric information security risk assessment and response framework. International Journal of Advanced Computer Science and Applications, 9(10), 148-163. https://doi.org/10.14569/IJACSA.2018.091018.
  • Furnell, S. (2018). Assessing website password practices – over a decade of progress?. Computer Fraud and Security, 2018(7), 6-13. https://doi.org/10.1016/S1361-3723(18)30063-0.
  • Alohali, M., Clarke, N., Li, F., Furnell, S. (2018). Identifying and predicting the factors affecting end-users’ risk-taking behavior. Information and Computer Security, 26(3), 306-326. https://doi.org/10.1108/ICS-03-2018-0037.
  • Alotaibi, S., Furnell, S., Clarke, N. (2018). A novel transparent user authentication approach for mobile applications. Information Security Journal: a Global Perspective, 27(5-6), 292-305. https://doi.org/10.1080/19393555.2019.1609628.

Conference Publications

  • Al-Kawaz, H., Clarke, N., Furnell, S., Li, F., Alruban, A. (2018). Advanced facial recognition for digital forensics. European Conference on Information Warfare and Security, ECCWS (11-19). Curran Associates Inc.. https://ro.ecu.edu.au/ecuworkspost2013/4528.
  • Alotibi, G., Clarke, N., Li, F., Furnell, S. (2018). The Current Situation of Insider Threats Detection: An Investigative Review. 21st Saudi Computer Society National Computer Conference, NCC 2018 (7 p.). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/NCG.2018.8592986.
  • Mahmoud, N., Furnell, S., Haskell-Dowland, P. (2018). Design Principles and Guidelines for Targeted Security Awareness. Proceedings of the Annual Information Institute Conference (18p.). Information Institute. https://ro.ecu.edu.au/ecuworkspost2013/6407.
  • Alruban, A., Clarke, N., Li, F., Furnell, S. (2018). Biometrically linking document leakage to the individuals responsible. Trust, Privacy and Security in Digital Business 15th International Conference Proceedings (135-149). Springer Verlag. https://doi.org/10.1007/978-3-319-98385-1_10.
  • Herkanaidu, R., Furnell, S., Papadaki, M., Khuchinda, T. (2018). Designing an Anti-Cyberbullying Programme in Thailand. Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2018) (111-122). Centre for Security, Communications and Network Research. https://ro.ecu.edu.au/ecuworkspost2013/11948.

Book Chapters

  • Furnell, S. (2017). The evolving landscape of technology-dependent crime. The Routledge Handbook of Technology, Crime and Justice (65-77). Routledge. https://doi.org/10.4324/9781315743981.

Journal Articles

  • Clarke, N., Li, F., Furnell, S. (2017). A novel privacy preserving user identification approach for network traffic. Computers and Security, 70(2017), 335-350. https://doi.org/10.1016/j.cose.2017.06.012.
  • Korovessis, P., Furnell, S., Papadaki, M., Haskell-Dowland, P. (2017). A toolkit approach to information security awareness and education. Journal of Cybersecurity Education, Research and Practice, 2017(2), article no.5.

Conference Publications

  • Alqahtani, N., Furnell, S., Atkinson, S., Stengel, I. (2017). Internet risks for children: Parents' perceptions and attitudes: An investigative study of the Saudi Context. 2017 Internet Technologies and Applications, ITA 2017 - Proceedings of the 7th International Conference (98-103). https://doi.org/10.1109/ITECHA.2017.8101918.
  • Alotaibi, F., Clarke, N., Furnell, S. (2017). An analysis of home user security awareness & education. 2017 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017 (116-122). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.23919/ICITST.2017.8356359.
  • Alotaibi, F., Furnell, S., Stengel, I., Papadaki, M. (2017). Enhancing cyber security awareness with mobile games. 2017 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017 (129-134). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.23919/ICITST.2017.8356361.
  • Alruban, A., Clarke, N., Li, F., Furnell, S. (2017). Insider misuse attribution using biometrics. ACM International Conference Proceeding Series (7p.). https://doi.org/10.1145/3098954.3103160.
  • Mashhadani, S., Al-Kawaz, H., Clarke, N., Furnell, S., Li, F. (2017). A novel multimedia-forensic analysis tool (M-FAT). 2017 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017 (388-395). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.23919/ICITST.2017.8356429.
  • Clarke, N., Li, F., Alruban, A., Furnell, S. (2017). Insider Misuse Identification using Transparent Biometrics. Proceedings of the 50th Hawaii International Conference on System Sciences (4031-4040). University of Hawaii. https://doi.org/10.24251/HICSS.2017.487.
  • Alqahtany, S., Clarke, N., Furnell, S., Reich, C. (2017). A forensic acquisition based upon a cluster analysis of non-volatile memory in IaaS. 2017 2nd International Conference on Anti-Cyber Crimes (ICACC) (123-128). IEEE. https://doi.org/10.1109/Anti-Cybercrime.2017.7905276.
  • Mahmoud, N., Furnell, S., Haskell-Dowland, P. (2017). Towards Targeted Security Awareness Raising. Proceedings of the Annual Information Institute Conference (13p.). Information Institute.
  • Alotaibi, F., Furnell, S., Stengel, I., Papadaki, M. (2017). Gamifying cyber security awareness via mobile training apps. CERC 2017 Collaborative European Research Conference Proceedings (177-179). CEUR Workshop Proceedings.

Journal Articles

  • Gaseb, A., Clarke, N., Li, F., Furnell, S. (2016). Identifying Users by Network Traffic Metadata. International Journal of Chaotic Computing, 4(2), 109-118.
  • Alruban, A., Clarke, N., Li, F., Furnell, S. (2016). Leveraging Biometrics for Insider Misuse Identification. International Journal on Cyber Situational Awareness, 1(1), 130-151. https://doi.org/10.22619/IJCSA.2016.100107.
  • Furnell, S. (2016). Vulnerability management: not a patch on where we should be?. Network Security, 2016(4), 5-9. https://doi.org/10.1016/S1353-4858(16)30036-8.
  • Alsaiari, H., Papadaki, M., Haskell-Dowland, P., Furnell, S. (2016). Graphical One-Time Password (GOTPass): A usability evaluation. Information Security Journal: a Global Perspective, 25(1-3), 94-108. https://doi.org/10.1080/19393555.2016.1179374.
  • Alotaibi, S., Furnell, S., Clarke, N. (2016). A Novel Taxonomy for Mobile Applications Data. International Journal of Cyber-Security and Digital Forensics, 5(3), 115-121. https://doi.org/10.17781/P002070.
  • Furnell, S. (2016). The usability of security – revisited. Computer Fraud and Security, 2016(9), 5-11. https://doi.org/10.1016/S1361-3723(16)30070-7.
  • Zaaba, ZF., Furnell, S., Haskell-Dowland, P. (2016). Literature Studies on Security Warnings Development. International Journal on Perceptive and Cognitive Computing, 2(1), 8-18. https://doi.org/10.31436/ijpcc.v2i1.22.
  • Fahdi, A., Clarke, N., Li, F., Furnell, S. (2016). A suspect-oriented intelligent and automated computer forensic analysis. Digital Investigation, 18(1 Sep, 2016), 65-76. https://doi.org/10.1016/j.diin.2016.08.001.

Conference Publications

  • Alsaiari, H., Papadaki, M., Haskell-Dowland, P., Furnell, S. (2016). A review of graphical authentication utilising a keypad input method. Proceedings of the 8th Saudi Students Conference (359-374). World Scientific Publishing Co.. https://doi.org/10.1142/9781783269150_0031.
  • Alotaibi, S., Furnell, S., Clarke, N. (2016). Transparent authentication systems for mobile device security: A review. 10th International Conference for Internet Technology and Secured Transactions (406-413). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICITST.2015.7412131.
  • Alotaibi, M., Furnell, S., Clarke, N. (2016). Information Security Policies: A Review of Challenges and Influencing Factors. 11th International Conference for Internet Technology and Secured Transactions, ICITST 2016 (352-358). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICITST.2016.7856729.
  • Alqahtany, S., Clarke, N., Furnell, S., Reich, C. (2016). A Forensic Acquisition and Analysis System for IaaS: Architectural Model and Experiment. Proceedings 2016 11th International Conference on Availability, Reliability and Security ARES 2016 (345-354). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ARES.2016.58.
  • Alotaibi, F., Furnell, S., Stengel, I., Papadaki, M. (2016). A Survey of Cyber-Security Awareness in Saudi Arabia. 11th International Conference for Internet Technology and Secured Transactions, ICITST 2016 (154-158). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICITST.2016.7856687.
  • Clarke, N., Li, F., Furnell, S., Stengel, I., Ganis, G. (2016). Information security and practice: The user's perspective. Proceedings of the 11th International Conference on Cyber Warfare and Security, ICCWS 2016 (81-89). Academic Conferences Limited.
  • Alotibi, G., Clarke, N., Li, F., Furnell, S. (2016). User profiling from network traffic via novel application-level interactions. 11th International Conference for Internet Technology and Secured Transactions, ICITST 2016 (279-285). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICITST.2016.7856712.
  • Alruban, A., Clarke, N., Li, F., Furnell, S. (2016). Proactive Biometric-Enabled Forensic Imprinting. 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security) Proceedings (1-15). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/CyberSecPODS.2016.7502342.

Journal Articles

  • Saevanee, H., Clarke, N., Furnell, S., Biscione, V. (2015). Continuous user authentication using multi-modal biometrics. Computers and Security, 53(2015), 234-246. https://doi.org/10.1016/j.cose.2015.06.001.
  • Alsaiari, H., Papadaki, M., Haskell-Dowland, P., Furnell, S. (2015). Secure Graphical One Time Password (GOTPass): An Empirical Study. Information Security Journal: a Global Perspective, 24(4-6), 207-220. https://doi.org/10.1080/19393555.2015.1115927.
  • Alotaibi, S., Furnell, S., Clarke, N. (2015). A fine-grained analysis of user activity on mobile applications: The sensitivity level perception. International Journal for Information Security Research, 5(3), 591-599.

Conference Publications

  • Alotibi, G., Li, F., Clarke, N., Furnell, S. (2015). Behavioral-based feature abstraction from network traffic. Proceedings of the 10th International Conference on Cyber Warfare and Security (1-9). Academic Conferences and Publishing International Ltd.
  • Al Abdulwahid, A., Clarke, N., Stengel, I., Furnell, S., Reich, C. (2015). A survey of continuous and transparent multibiometric authentication systems. Proceedings of the 14th European Conference on Cyber Warfare and Security, ECCWS 2015 (1-10). Curran Associates Inc..
  • Al Abdulwahid, A., Clarke, N., Stengel, I., Furnell, S., Reich, C. (2015). The Current Use of Authentication Technologies: An Investigative Review. 2015 International Conference on Cloud Computing (ICCC) (239-246). IEEE. https://doi.org/10.1109/CLOUDCOMP.2015.7149658.
  • Al Abdulwahid, A., Clarke, N., Stengel, I., Furnell, S., Reich, C. (2015). Security, privacy and usability – a survey of users’ perceptions and attitudes. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (153-168). Springer. https://doi.org/10.1007/978-3-319-22906-5_12.
  • Sherif, E., Furnell, S., Clarke, N. (2015). Awareness, behaviour and culture: The ABC in cultivating security compliance. 10th International Conference for Internet Technology and Secured Transactions ICITST (90-94). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICITST.2015.7412064.
  • Sherif, E., Furnell, S., Clarke, N. (2015). An identification of variables influencing the establishment of information security culture. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (436-448). Springer Verlag. https://doi.org/10.1007/978-3-319-20376-8_39.

Journal Articles

  • Jali, MZ., Furnell, S., Haskell-Dowland, P. (2014). Investigating the Viability of Multifactor Graphical Passwords for User Authentication. Information Security Journal, 23(1-2), 10-21. https://doi.org/10.1080/19393555.2014.891274.
  • Anuar, NB., Papadaki, M., Furnell, S., Clarke, N. (2014). A Response Selection Model for Intrusion Response Systems: Response Strategy Model (RSM). Security and Communication Networks, 7(11), 1831-1848. https://doi.org/10.1002/sec.896.
  • Furnell, S., Van Niekerk, J., Clarke, N. (2014). The price of patching. Computer Fraud & Security, 2014(8), 8-13.

Conference Publications

  • Joy, D., Li, F., Clarke, N., Furnell, S. (2014). A user-oriented network forensic analyser: the design of a high-level protocol analyser. Proceedings of the 12th Australian Digital Forensics Conference (84-93). Security Research Institute, ECU. https://doi.org/10.4225/75/57b3e511fb87f.
  • Li, F., Clarke, N., Furnell, S., Mkwawa, I. (2014). Performance evaluation of a technology independent security gateway for next generation networks. Wireless and Mobile Computing, Networking and Communications (WiMob), 2014 IEEE 10th International Conference on (281-286). IEEE. https://doi.org/10.1109/WiMOB.2014.6962183.
  • Al Abdulwahid, A., Clarke, N., Furnell, S., Stengel, I. (2014). A conceptual model for federated authentication in the cloud. Proceedings of the 11th Australian Information Security Management Conference, ISM 2013 (1-11). Edith Cowan University.
  • Alqahtany, S., Clarke, N., Furnell, S., Reich, C. (2014). A forensically-enabled IASS cloud computing architecture. Proceedings of the 12th Australian Digital Forensics Conference (75-83). Security Research Institute, Edith Cowan University. https://doi.org/10.4225/75/57b3e3a5fb87e.

Journal Articles

  • Hocking, C., Furnell, S., Clarke, N., Reynolds, P. (2013). Co-operative user identity verification using an Authentication Aura. Computers and Security, 39(Part b), 486-502. https://doi.org/10.1016/j.cose.2013.09.011.
  • Furnell, S. (2013). Still on the hook: the persistent problem of phishing. Computer Fraud & Security, October(n/a), 7-12.
  • Furnell, S. (2013). Getting past passwords. Computer Fraud & Security, April(n/a), 8-13.

Conference Publications

  • Furnell, S. (2013). Security education: The challenge beyond the classroom. Information Assurance and Security Education and Training. 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings (32-38). Springer. https://doi.org/10.1007/978-3-642-39377-8_4.
  • Clarke, N., Haskell-Dowland, P., Furnell, S. (2013). E-Invigilator: A biometric-based Supervision System for e-Assessments. 2013 International Conference on Information Society (i-Society) (238-242). IEEE.
  • Li, F., Clarke, N., Furnell, S., Fajardo, JO., Liberal, F., Sidibe, M. (2013). A Technology Independent Security Gateway for Future Emergency Telecommunication Systems (ETS). Proceedings of the fifth international conference on internet technologies and applications (ITA 13)Proceeding of the International Workshop on Emergency Telecommunications Systems (ETS 2013) (299-308). Glyndwr University.
  • Li, F., Clarke, N., Furnell, S. (2013). A Technology Independent Security Gateway for Real-Time Multimedia Communication. Network and System Security. Lecture Notes in Computer Science (14-25). Springer. https://doi.org/10.1007/978-3-642-38631-2_2.
  • Furnell, S., Bar, N. (2013). Essential Lessons Still Not Learned? Examining the Password Practices of End-Users and Service Providers. Human Aspects of Information Security, Privacy, and Trust. Lecture Notes in Computer Science (217-225). Springer. https://doi.org/10.1007/978-3-642-39345-7-23.

Conference Publications

  • Saevanee, H., Clarke, N., Furnell, S. (2012). Multi-modal behavioural biometric authentication for mobile devices. Information Security and Privacy Research: 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012 Proceedings (465-474). Springer. https://doi.org/10.1007/978-3-642-30436-1_38.
  • Anuar, NB., Papadaki, M., Furnell, S., Clarke, N. (2012). A Response Strategy Model for Intrusion Response Systems. Information Security and Privacy Research: 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012 Proceedings (573-578). Springer. https://doi.org/10.1007/978-3-642-30436-1_51.
  • Clarke, N., Katos, V., Menesidou, S., Ghita, B., Furnell, S. (2012). A novel security architecture for a space-data DTN. Wired/Wireless Internet Communication '12 Proceedings of the 10th International Conference on Wired/Wireless Internet Communication (342-349). Springer. https://doi.org/10.1007/978-3-642-30630-3_31.

Journal Articles

  • Talib, S., Clarke, N., Furnell, S. (2011). Establishing a personalized information security culture. International Journal of Mobile Computing and Multimedia Communications, 3(1), 63-79. https://doi.org/10.4018/jmcmc.2011010105.
  • Hocking, C., Furnell, S., Clarke, N., Reynolds, P. (2011). Authentication Aura - A distributed approach to user authentication. Journal of Information Assurance and Security, 6(2), 149-156.
  • Sanders, B., Haskell-Dowland, P., Atkinson, S., Furnell, S. (2011). Massively Multi-Player Online Role Playing Games: What’s the Risk?. Journal of Virtual Worlds Research, 3(3), 6p.. https://doi.org/10.4101/jvwr.v3i3.874.
  • Jali, M., Furnell, S., Haskell-Dowland, P. (2011). Quantifying the effect of graphical password guidelines for better security. IFIP Advances in Information and Communication Technology, 354(2011), 80-91. https://doi.org/10.1007/978-3-642-21424-0_7.

Conference Publications

  • Saevanee, H., Clarke, N., Furnell, S. (2011). SMS Linguistic Profiling Authentication on Mobile Device. 2011 5th International Conference on Network and System Security (NSS) (224-228). IEEE. https://doi.org/10.1109/ICNSS.2011.6060004.
  • Jali, MZ., Furnell, S., Haskell-Dowland, P. (2011). Multifactor graphical passwords: An assessment of end-user performance. Proceedings of the 2011 7th International Conference on Information Assurance and Security, IAS 2011 (Article no. 6122786). IEEE. https://doi.org/10.1109/ISIAS.2011.6122786.
  • Hocking, C., Furnell, S., Clarke, N., Reynolds, P. (2011). A preliminary investigation of distributed and cooperative user authentication. The Proceedings of the 9th Australian Information Security Management Conference (101-110). Security Research Centre, Edith Cowan University.
  • Zaaba, Z., Furnell, S., Haskell-Dowland, P. (2011). End-user perception and usability of information security. Proceedings of the fifth international symposium on human aspects of information security and assurance (97-107). University of Plymouth.
  • Anuar, NB., Furnell, S., Papadakil, M., Clarke, N. (2011). A risk index model for security incident prioritisation. The Proceedings of the 9th Australian Information Security Management Conference (25-39). Security Research Centre, Edith Cowan University.

Journal Articles

  • Jali, M., Furnell, S., Haskell-Dowland, P. (2010). Assessing image-based authentication techniques in a web-based environment.. Information Management & Computer Security, 18(1), 43-53.
  • Furnell, S. (2010). Jumping Security Hurdles. Computer Fraud & Security, 2010(6), 10-14.
  • Tjhai, GC., Furnell, S., Papadaki, M., Clarke, N. (2010). A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm. Computers & Security, 29(6), 712-723.
  • Chipperfield, C., Furnell, S. (2010). From security policy to practice: Sending the right messages. Computer Fraud & Security, 2010(3), 13-19.

Conference Publications

  • Talib, S., Clarke, N., Furnell, S. (2010). An Analysis of Information Security Awareness within Home and Work Environments. Availability, Reliability and Security, 2010. ARES '10. International Conference on (196-203). IEEE. https://doi.org/10.1109/ARES.2010.27.
  • Anuar, NB., Papadaki, M., Furnell, S., Clarke, N. (2010). An investigation and survey of response options for Intrusion Response Systems (IRSs). Proceedings of the 2010 Information Security for South Africa Conference, ISSA 2010 (Article no. 5588654). IEEE. https://doi.org/10.1109/ISSA.2010.5588654.
  • Hocking, C., Furnell, S., Clarke, N., Reynolds, PL. (2010). A distributed and cooperative user authentication framework. Information Assurance and Security (IAS), 2010 Sixth International Conference on (304-310). IEEE. https://doi.org/10.1109/ISIAS.2010.5604058.
  • Ibrahim, T., Furnell, S., Papadaki, M., Clarke, N. (2010). Assessing the Usability of End-User Security Software. Trust, Privacy and Security in Digital Business 7th International Conference, TrustBus 2010, Bilbao,2010. Proceedings (177-189). Springer. https://doi.org/10.1007/978-3-642-15152-1_16.

Books

  • Furnell, S. (2009). Mobile Security: A Pocket Guide. IT Governance Publishing.

Journal Articles

  • Furnell, S., Thomson, K. (2009). From culture to disobedience: Recognising the varying user acceptance of IT security. Computer Fraud & Security, 2009(2), 5-10. https://doi.org/10.1016/S1361-3723(09)70019-3.
  • Botha, RA., Furnell, S., Clarke, N. (2009). From desktop to mobile: Examining the security experience. Computers & Security, 28(3-4), 130-137.
  • Furnell, S., Thomson, K. (2009). Recognising and addressing 'security fatigue'. Computer Fraud & Security, 2009(11), 7-11. https://doi.org/10.1016/S1361-3723(09)70139-3.
  • Furnell, S., Papadaki, M., Thomson, K. (2009). Scare Tactics - A viable weapon in the security war?. Computer Fraud & Security, 2009(12), 6-10. https://doi.org/10.1016/S1361-3723(09)70151-4.
  • Atkinson, S., Furnell, S., Phippen, A. (2009). Securing the next generation: enhancing e-safety awareness among young people. Computer Fraud & Security, 2009(7), 13-19. https://doi.org/10.1016/S1361-3723(09)70088-0.

Conference Publications

  • Atkinson, S., Furnell, S., Phippen, A. (2009). Risk Culture Influences in Internet Safety and Security. Proceedings of the Third International Symposium on Human Aspects of Information Security & Assurance (HAISA 2009) (61-70). University of Plymouth.
  • Newbould, M., Furnell, S. (2009). Playing Safe: A prototype game for raising awareness of social engineering. Proceedings of the 7th Australian Information Security Management Conference (24-30). Edith Cowan University.
  • Jali, M., Furnell, S., Haskell-Dowland, P. (2009). Evaluating Web-Based User Authentication using Graphical Techniques. Proceedings of the Third International Symposium on Human Aspects of Information Security & Assurance (HAISA 2009) (108-118). University of Plymouth.
  • Ibrahim, T., Furnell, S., Papadaki, M., Clarke, N. (2009). Assessing the Usability of Personal Internet Security Tools. Proceedings of the 8th European Conference on Information Warfare and Security (102-111). Academic Publishing Limited.
  • Szewczyk, P., Furnell, S. (2009). Assessing the Online Security Awareness of Australian Internet Users. Proceedings of the Annual Security Conference (58-1to58-9). Information Institute Publishing.
  • Clarke, N., Karatzouni, S., Furnell, S. (2009). Flexible and Transparent User Authentication for Mobile Devices. 24th IFIP TC11 International Information Security Conference, SEC 2009; Pafos; Cyprus; 18 May 2009 through 20 May 2009, Proceedings (1-12). Springer. https://doi.org/10.1007/978-3-642-01244-0_1.
  • Sanders, B., Haskell-Dowland, P., Furnell, S. (2009). An Assessment of People's Vulnerabilities in Relation to Personal and Sensitive Data. Proceedings of the Third International Symposium on Human Aspects of Information Security & Assurance (HAISA 2009) (50-60). University of Plymouth.

Journal Articles

  • Furnell, S., Clarke, N., Karatzouni, S. (2008). Beyond the Pin: Enhancing User Authentication for Mobile Devices. Computer Fraud & Security, 2008(8), 12-17.
  • Furnell, S., Ward, J. (2008). It�S a Jungle Out there: Predators, Prey and Protection in the online Wilderness. Computer Fraud & Security, 2008(10), 3-6.
  • Furnell, S., Ward, J. (2008). Self-preservation among online prey. Computer Fraud & Security, 2008(11), 9-12.
  • Furnell, S., Tsaganidi, V., Phippen, A. (2008). Security beliefs and barriers for novice Internet users. Computers & security, 27(7-8), 235-240.
  • Furnell, S., Shams, R., Phippen, A. (2008). Who guides the little guy? Exploring security advice and guidance from retailers and ISPs. Computer Fraud & Security, 27(Dec), 6-10.

Conference Publications

  • Helala, M., Furnell, S., Papadaki, M. (2008). Evaluating the Usability Impacts of Security Interface Adjustments in Word 2007. Proceedings of the 6th Australian Information Security Management Conference (48 - 55). SECAU Security Research Centre.

Journal Articles

  • Rodwell, P., Furnell, S., Reynolds, P. (2007). A Non-Intrusive Biometric Authentication Mechanism Utilising Physiological Characteristics of the Human Head. Computers & Security, 26(7-8), 468-478.
  • Tucker, C., Furnell, S., Ghita, B., Brooke, P. (2007). A New Taxonomy for Comparing Intrusion Detection Systems. Internet Research, 17(1), 88-98.
  • Furnell, S., Evangelatos, K. (2007). Public Awareness and Perceptions of Biometrics. Computer Fraud & Security, 2007(1), 8-13.
  • Furnell, S. (2007). An Assessment of Website Password Practices. Computers & Security, 26(7-8), 445-451.
  • Furnell, S. (2007). Phishing: Can we spot the signs?. Computer Fraud & Security, 2007(3), 10-15.
  • Furnell, S. (2007). Making Security Usable: Are Things Improving?. Computers & Security, 26(6), 434-443.
  • Clarke, N., Furnell, S. (2007). Authenticating mobile phone users using keystroke analysis. International Journal of Information Security, 6(1), 1-14.
  • Furnell, S., Bryant, P., Phippen, A. (2007). Assessing the Security Perceptions of Personal Internet Users. Computers & Security, 26(5), 410-417.
  • Clarke, N., Furnell, S. (2007). Advanced User Authentication for Mobile Devices. Computers & Security, 26(2), 109-119.

Conference Publications

  • Karatzouni, S., Clarke, N., Furnell, S. (2007). Device- versus Network-Centric Authentication Paradigms for Mobile Devices: Operational and Perceptual Trade-Offs. Proceedings of the 5th AISMC (116-125). Edith Cowan University.

Journal Articles

  • Furnell, S., Jusoh, A., Katsabas, D. (2006). The challenges of understanding and using security: A survey of end-users. Computers and Security, 25(1), 27-35.
  • Clarke, N., Furnell, S. (2006). A Composite User Authentication Architecture for Mobile Devices. Journal of Information Warfare, 5(2), 11-29.
  • Papadaki, M., Furnell, S. (2006). Achieving Automated Intrusion Response: A Prototype Implementation. Information Management & Computer Security, 14(3), 235-251.
  • Lacohee, H., Phippen, A., Furnell, S. (2006). Risk and Restitution: Assessing how users establish online trust. Computers & Security, 25(7), 486-493.

Conference Publications

  • Fischer, K., Bleimann, U., Fuhrmann, W., Furnell, S. (2006). Security-Relevant Semantic Patterns of BPEL in Cross-Organisational Business Processes. Proceedings of the Sixth International Conference on Networked Computing (203-212). Universtiy of Plymouth.
  • Ghita, B., Furnell, S. (2006). Assessing the usability of WLAN security for SOHO users. Proceedings of the The 5th Security Conference: The Challenge of Managing System Integrity (11p). The Information Institute.
  • Katsabas, D., Furnell, S., Dowland, P. (2006). Evaluation of end-user application security from a usability perspective. Grand Challenges in Technology Management (13p). The Information Institute.

Journal Articles

  • Clarke, N., Furnell, S. (2005). Authentication of users on mobile telephones - A survey of attitudes and practices. Computers & Security, 24(7), 519-527.
  • Furnell, S. (2005). Why users cannot use security. Computers and Security, 24(4), 274-279. https://doi.org/10.1016/j.cose.2005.04.003.

Conference Publications

  • Clarke, N., Furnell, S. (2005). User Authentication for Mobile Devices: A Composite Approach. Protecting the Australian homeland : conference proceedings of [the] 6th Australian Information Warfare & Security Conference (48-56). Deakin University, School of Information Systems.
  • Lecomte, J., Clarke, N., Furnell, S. (2005). Artifical Impostor Profiling for Keystroke Analysis on a Mobile Handset. Proceedings of the Fifth International Network Conference (INC 2005) (199-206). University of the Aegean.
  • Salama, E., Ghita, B., Furnell, S. (2005). HTTP-aware Anonymisation of Packet Traces. Proceedings of the First International Conference on Internet Technologies and Applications (ITA05) (421-430). North East Wales Institute.
  • Ghita, B., Furnell, S., Lines, B., Ifeachor, E. (2005). TCP performance estimation using neural networks modelling. Proceedings of the Fifth International Network Conference (INC 2005) (19-30). University of the Aegean.
  • Katsabas, D., Furnell, S., Dowland, P. (2005). Using Human Computer Interaction principles to promote usable security. Proceedings of the Fifth International Network Conference (INC 2005) (235-241). University of the Aegean.
  • Fischer, K., Bleimann, U., Fuhrmann, W., Furnell, S. (2005). A Security Infrastructure for Cross-Domain Development of Script-Based Business Processes in SOC Environments. Proceedings of the Fifth International Network Conference INC 2005 (207-216). University of the Aegean.
  • Furnell, S., Katos, V., Clarke, N. (2005). Considering the role of academic qualifications for IT security professionals. Proceedings of the 1st Colloquium for Information Systems Security Education - Asia Pacific (CISSE-AP) (1-11). University of South Australia.
  • Dimopoulos, V., Furnell, S. (2005). A protection profiles approach to risk analysis for small and medium enterprises. Security management, integrity, and internal control in information systems : IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference (267-283). Springer. https://doi.org/10.1007/0-387-31167-X_17.
Skip to top of page