2020 - ACM Senior Member
Steven Furnell mostly deals with Computer security, Authentication, Internet privacy, Mobile device and Biometrics. His biological study focuses on Password. His Authentication research includes elements of Mobile phone, Profiling, Artificial intelligence and Handset.
His Internet privacy study incorporates themes from Authentication, Legislation and Survey data collection. Steven Furnell interconnects User authentication, Keystroke dynamics and Human–computer interaction in the investigation of issues within Biometrics. The The Internet study combines topics in areas such as Marketing, Purchasing and Hacker.
Computer security, Internet privacy, Authentication, The Internet and Information security are his primary areas of study. Steven Furnell has included themes like Cloud computing security and Mobile device in his Computer security study. His Internet privacy research includes themes of Phishing, Usability, Malware and Security awareness.
His Authentication study focuses on User authentication in particular. His The Internet study frequently intersects with other fields, such as Hacker. His Information security research integrates issues from Information security management, Public relations and Knowledge management.
Steven Furnell spends much of his time researching Computer security, Internet privacy, Information security, The Internet and Digital forensics. His work in Authentication and Malware are all subfields of Computer security research. His Internet privacy study combines topics in areas such as Information security awareness, Password, Task and Security awareness.
His research in Information security intersects with topics in Theory of planned behavior, Control, Compliance and User-centered design. His studies in The Internet integrate themes in fields like Diversity, Multilevel model, Survey data collection and Promotion. In his study, which falls under the umbrella issue of Digital forensics, Internet Protocol, Network forensics, Computer forensics and Traffic analysis is strongly linked to Identification.
His primary areas of study are Information security, Computer security, Internet privacy, Compliance and The Internet. His Information security study integrates concerns from other disciplines, such as Theory of planned behavior, Situational ethics, Crime prevention and Public relations. Computer security is often connected to Scale in his work.
His Internet privacy research is multidisciplinary, incorporating elements of Information security awareness, Password, Control and Misconduct. While the research belongs to areas of Compliance, Steven Furnell spends his time largely on the problem of Information security management, intersecting his research to questions surrounding End user. His study in The Internet is interdisciplinary in nature, drawing from both Forwarding plane, Wireless sensor network and Health care.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Information security policy compliance model in organizations
Nader Sohrabi Safa;Rossouw Von Solms;Steven Furnell.
Computers & Security (2016)
Authenticating mobile phone users using keystroke analysis
N. L. Clarke;S. M. Furnell.
International Journal of Information Security (2006)
Security implications of electronic commerce: a survey of consumers and businesses
Steven M. Furnell;T. Karweni.
Internet Research (1999)
Information security conscious care behaviour formation in organizations
Nader Sohrabi Safa;Mehdi Sookhak;Rossouw Von Solms;Steven Furnell.
Computers & Security (2015)
Cybercrime Vandalizing the Information Society
Steven Furnell.
(2001)
Authentication of users on mobile telephones - A survey of attitudes and practices
N. L. Clarke;S. M. Furnell.
Computers & Security (2005)
Surveying the Development of Biometric User Authentication on Mobile Phones
Weizhi Meng;Duncan S. Wong;Steven Furnell;Jianying Zhou.
IEEE Communications Surveys and Tutorials (2015)
Assessing the security perceptions of personal Internet users
S. M. Furnell;P. Bryant;A. D. Phippen.
Computers & Security (2007)
Events: Insider Threat Prediction Tool: Evaluating the probability of IT misuse
G.B Magklaras;S.M Furnell.
Computers & Security (2001)
A practical evaluation of Web analytics
Andrew D. Phippen;L. Sheppard;Steven Furnell.
Internet Research (2004)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Plymouth University
University of Malaya
Nelson Mandela University
National Yunlin University of Science and Technology
Athens University of Economics and Business
Singapore University of Technology and Design
University of Malaga
University of Malaya
University of Malaya
University of California, Davis
Kyushu University
New York University
University of Oxford
University of Michigan–Ann Arbor
Dalhousie University
Shanghai Jiao Tong University
Utrecht University
Wuhan University of Technology
Forschungszentrum Jülich
Lund University
Federal University of Rio Grande do Sul
University of Wrocław
University of Maryland, College Park
Erasmus University Rotterdam
Copenhagen University Hospital
University of North Carolina at Chapel Hill