Search Results - "Furnell, S.M."
-
1
Security issues in Online Distance Learning
Published in VINE. Very informal newsletter on library automation (01-06-2001)“…This paper considers the issue of security in the provision of online distance learning. Security represents an aspect that may not suggest itself as a high…”
Get full text
Journal Article -
2
Advanced user authentication for mobile devices
Published in Computers & security (01-03-2007)“…As mobile devices continue to evolve in terms of the capabilities and services offered, so they introduce additional demands in terms of security. An issue…”
Get full text
Journal Article -
3
Assessing the security perceptions of personal Internet users
Published in Computers & security (01-08-2007)“…Personal Internet users are increasingly finding themselves exposed to security threats during their use of home PC systems. However, concern can be raised…”
Get full text
Journal Article -
4
The challenges of understanding and using security: A survey of end-users
Published in Computers & security (01-02-2006)“…Many applications contain security features that are available for end-users to select and configure, as well as the potential to place users in situations…”
Get full text
Journal Article -
5
Authentication of users on mobile telephones – A survey of attitudes and practices
Published in Computers & security (01-10-2005)“…With the ever-increasing functionality and services accessible via mobile telephones, there is a strong argument that the level of user authentication…”
Get full text
Journal Article -
6
Assessing image-based authentication techniques in a web-based environment
Published in Information management & computer security (01-01-2010)“…Purpose - The purpose of this paper is to assess the usability of two image-based authentication methods when used in the web-based environment. The evaluated…”
Get full text
Journal Article -
7
Towards an insider threat prediction specification language
Published in Information management & computer security (01-08-2006)“…Purpose - This paper presents the process of constructing a language tailored to describing insider threat incidents, for the purposes of mitigating threats…”
Get full text
Journal Article -
8
Insider Threat Prediction Tool: Evaluating the probability of IT misuse
Published in Computers & security (2001)“…Despite the well documented and emerging insider threat to information systems, there is currently no substantial effort devoted to addressing the problem of…”
Get full text
Journal Article -
9
Achieving automated intrusion response: a prototype implementation
Published in Information management & computer security (2006)“…Purpose - The increasing speed and volume of attacks against networked systems highlights the need to automate the intrusion response process. This paper…”
Get full text
Journal Article -
10
Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks
Published in Ad hoc networks (01-09-2008)“…Nowadays, a commonly used wireless network (i.e., Wi-Fi) operates with the aid of a fixed infrastructure (i.e., an access point) to facilitate communication…”
Get full text
Journal Article -
11
A long-term trial of alternative user authentication technologies
Published in Information management & computer security (01-04-2004)“…Modern IT systems have a continued requirement for reliable user authentication at login. However, the majority of systems are still using username password…”
Get full text
Journal Article -
12
Co-operative user identity verification using an Authentication Aura
Published in Computers & security (01-11-2013)“…IT usage today is typified by users that operate across multiple devices, including traditional desktop PCs, laptops, tablets and smartphones. As a…”
Get full text
Journal Article -
13
Keystroke dynamics on a mobile handset: a feasibility study
Published in Information management & computer security (01-10-2003)“…The ability of third generation telephones to store sensitive information, such as financial records, digital certificates and company records, makes them…”
Get full text
Journal Article -
14
Analysis of security-relevant semantics of BPEL in cross-domain defined business processes
Published in Information management & computer security (2007)“…Purpose - Aims to identify security-relevant semantics of business processes being defined by WS-BPEL (Web Services Business Process Execution Language, BPEL…”
Get full text
Journal Article -
15
A preliminary model of end user sophistication for insider threat prediction in IT systems
Published in Computers & security (01-08-2005)“…The dangers that originate from acts of IT system misuse by legitimate users constitute a separate category of threats with well documented consequences for…”
Get full text
Journal Article -
16
An automated framework for managing security vulnerabilities
Published in Information management & computer security (01-04-2005)“…Purpose - This paper aims to look at unpatched software which represents a significant problem for internet-based systems, with a myriad malware incidents and…”
Get full text
Journal Article -
17
Risk and restitution: Assessing how users establish online trust
Published in Computers & security (01-10-2006)“…The belief that users must be assured of security prior to engaging with an online service is challenged through the examination of attitudes from participants…”
Get full text
Journal Article -
18
Security implications of electronic commerce: a survey of consumers and businesses
Published in Internet research (01-01-1999)“…Examines the general requirement for security technologies in order to provide a basis for trust in the e-commerce environment. The discussion is supported by…”
Get full text
Journal Article -
19
A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head
Published in Computers & security (01-12-2007)“…This paper proposes and evaluates a non-intrusive biometric authentication technique drawn from the discrete areas of biometrics and Auditory Evoked Responses…”
Get full text
Journal Article -
20
Dissecting the "Hacker Manifesto"
Published in Information management & computer security (01-05-1999)“…Twelve years ago, a text was written within the hacking community which is widely referred to as the "Hacker Manifesto". This text, and the opinions that it…”
Get full text
Journal Article