D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 54 Citations 10,143 410 World Ranking 3049 National Ranking 189

Research.com Recognitions

Awards & Achievements

2020 - ACM Senior Member

Overview

What is he best known for?

The fields of study he is best known for:

  • The Internet
  • Law
  • Computer security

Steven Furnell mostly deals with Computer security, Authentication, Internet privacy, Mobile device and Biometrics. His biological study focuses on Password. His Authentication research includes elements of Mobile phone, Profiling, Artificial intelligence and Handset.

His Internet privacy study incorporates themes from Authentication, Legislation and Survey data collection. Steven Furnell interconnects User authentication, Keystroke dynamics and Human–computer interaction in the investigation of issues within Biometrics. The The Internet study combines topics in areas such as Marketing, Purchasing and Hacker.

His most cited work include:

  • Authenticating mobile phone users using keystroke analysis (275 citations)
  • Security implications of electronic commerce: a survey of consumers and businesses (209 citations)
  • Authentication of users on mobile telephones - A survey of attitudes and practices (179 citations)

What are the main themes of his work throughout his whole career to date?

Computer security, Internet privacy, Authentication, The Internet and Information security are his primary areas of study. Steven Furnell has included themes like Cloud computing security and Mobile device in his Computer security study. His Internet privacy research includes themes of Phishing, Usability, Malware and Security awareness.

His Authentication study focuses on User authentication in particular. His The Internet study frequently intersects with other fields, such as Hacker. His Information security research integrates issues from Information security management, Public relations and Knowledge management.

He most often published in these fields:

  • Computer security (58.09%)
  • Internet privacy (28.60%)
  • Authentication (17.74%)

What were the highlights of his more recent work (between 2016-2021)?

  • Computer security (58.09%)
  • Internet privacy (28.60%)
  • Information security (13.08%)

In recent papers he was focusing on the following fields of study:

Steven Furnell spends much of his time researching Computer security, Internet privacy, Information security, The Internet and Digital forensics. His work in Authentication and Malware are all subfields of Computer security research. His Internet privacy study combines topics in areas such as Information security awareness, Password, Task and Security awareness.

His research in Information security intersects with topics in Theory of planned behavior, Control, Compliance and User-centered design. His studies in The Internet integrate themes in fields like Diversity, Multilevel model, Survey data collection and Promotion. In his study, which falls under the umbrella issue of Digital forensics, Internet Protocol, Network forensics, Computer forensics and Traffic analysis is strongly linked to Identification.

Between 2016 and 2021, his most popular works were:

  • AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection (85 citations)
  • Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks (44 citations)
  • Enhancing security behaviour by supporting the user (23 citations)

In his most recent research, the most cited papers focused on:

  • The Internet
  • Law
  • Computer security

His primary areas of study are Information security, Computer security, Internet privacy, Compliance and The Internet. His Information security study integrates concerns from other disciplines, such as Theory of planned behavior, Situational ethics, Crime prevention and Public relations. Computer security is often connected to Scale in his work.

His Internet privacy research is multidisciplinary, incorporating elements of Information security awareness, Password, Control and Misconduct. While the research belongs to areas of Compliance, Steven Furnell spends his time largely on the problem of Information security management, intersecting his research to questions surrounding End user. His study in The Internet is interdisciplinary in nature, drawing from both Forwarding plane, Wireless sensor network and Health care.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Information security policy compliance model in organizations

Nader Sohrabi Safa;Rossouw Von Solms;Steven Furnell.
Computers & Security (2016)

490 Citations

Authenticating mobile phone users using keystroke analysis

N. L. Clarke;S. M. Furnell.
International Journal of Information Security (2006)

403 Citations

Security implications of electronic commerce: a survey of consumers and businesses

Steven M. Furnell;T. Karweni.
Internet Research (1999)

397 Citations

Information security conscious care behaviour formation in organizations

Nader Sohrabi Safa;Mehdi Sookhak;Rossouw Von Solms;Steven Furnell.
Computers & Security (2015)

396 Citations

Cybercrime Vandalizing the Information Society

Steven Furnell.
(2001)

306 Citations

Authentication of users on mobile telephones - A survey of attitudes and practices

N. L. Clarke;S. M. Furnell.
Computers & Security (2005)

295 Citations

Surveying the Development of Biometric User Authentication on Mobile Phones

Weizhi Meng;Duncan S. Wong;Steven Furnell;Jianying Zhou.
IEEE Communications Surveys and Tutorials (2015)

260 Citations

Assessing the security perceptions of personal Internet users

S. M. Furnell;P. Bryant;A. D. Phippen.
Computers & Security (2007)

248 Citations

Events: Insider Threat Prediction Tool: Evaluating the probability of IT misuse

G.B Magklaras;S.M Furnell.
Computers & Security (2001)

247 Citations

A practical evaluation of Web analytics

Andrew D. Phippen;L. Sheppard;Steven Furnell.
Internet Research (2004)

246 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Steven Furnell

Thomas J. Holt

Thomas J. Holt

Michigan State University

Publications: 28

Nathan Clarke

Nathan Clarke

Plymouth University

Publications: 26

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 22

Nor Badrul Anuar

Nor Badrul Anuar

University of Malaya

Publications: 16

Rossouw von Solms

Rossouw von Solms

Nelson Mandela University

Publications: 14

Dimitris Gritzalis

Dimitris Gritzalis

Athens University of Economics and Business

Publications: 14

Julian Fierrez

Julian Fierrez

Autonomous University of Madrid

Publications: 12

Abdullah Gani

Abdullah Gani

University of Malaya

Publications: 12

Yuval Elovici

Yuval Elovici

Ben-Gurion University of the Negev

Publications: 11

Merrill Warkentin

Merrill Warkentin

Mississippi State University

Publications: 10

Shahab S. Band

Shahab S. Band

National Yunlin University of Science and Technology

Publications: 10

Mikko T. Siponen

Mikko T. Siponen

University of Jyväskylä

Publications: 9

Yu Wang

Yu Wang

City University of Hong Kong

Publications: 9

Muhammad Khurram Khan

Muhammad Khurram Khan

King Saud University

Publications: 9

H. Raghav Rao

H. Raghav Rao

The University of Texas at San Antonio

Publications: 8

Urs Hengartner

Urs Hengartner

University of Waterloo

Publications: 8

Trending Scientists

Makoto Yokoo

Makoto Yokoo

Kyushu University

Richard Cole

Richard Cole

New York University

Mary C. Daly

Mary C. Daly

University of Oxford

Mohammed N. Islam

Mohammed N. Islam

University of Michigan–Ann Arbor

Mary Anne White

Mary Anne White

Dalhousie University

Zhen-Hua Liu

Zhen-Hua Liu

Shanghai Jiao Tong University

Daniel Vanmaekelbergh

Daniel Vanmaekelbergh

Utrecht University

Zongkui Kou

Zongkui Kou

Wuhan University of Technology

R. Jones

R. Jones

Forschungszentrum Jülich

Deniz Kirik

Deniz Kirik

Lund University

Silvia Helena Koller

Silvia Helena Koller

Federal University of Rio Grande do Sul

Maciej Karwowski

Maciej Karwowski

University of Wrocław

Karen M. O'Brien

Karen M. O'Brien

University of Maryland, College Park

Wim C. J. Hop

Wim C. J. Hop

Erasmus University Rotterdam

Gorm B. Jensen

Gorm B. Jensen

Copenhagen University Hospital

Robert C. MacCallum

Robert C. MacCallum

University of North Carolina at Chapel Hill

Something went wrong. Please try again later.