Search Results - "Furnell, S.M."

Refine Results
  1. 1

    Security issues in Online Distance Learning by Furnell, S.M, Karweni, T

    “…This paper considers the issue of security in the provision of online distance learning. Security represents an aspect that may not suggest itself as a high…”
    Get full text
    Journal Article
  2. 2

    Advanced user authentication for mobile devices by Clarke, N.L., Furnell, S.M.

    Published in Computers & security (01-03-2007)
    “…As mobile devices continue to evolve in terms of the capabilities and services offered, so they introduce additional demands in terms of security. An issue…”
    Get full text
    Journal Article
  3. 3

    Assessing the security perceptions of personal Internet users by Furnell, S.M., Bryant, P., Phippen, A.D.

    Published in Computers & security (01-08-2007)
    “…Personal Internet users are increasingly finding themselves exposed to security threats during their use of home PC systems. However, concern can be raised…”
    Get full text
    Journal Article
  4. 4

    The challenges of understanding and using security: A survey of end-users by Furnell, S.M., Jusoh, A., Katsabas, D.

    Published in Computers & security (01-02-2006)
    “…Many applications contain security features that are available for end-users to select and configure, as well as the potential to place users in situations…”
    Get full text
    Journal Article
  5. 5

    Authentication of users on mobile telephones – A survey of attitudes and practices by Clarke, N.L., Furnell, S.M.

    Published in Computers & security (01-10-2005)
    “…With the ever-increasing functionality and services accessible via mobile telephones, there is a strong argument that the level of user authentication…”
    Get full text
    Journal Article
  6. 6

    Assessing image-based authentication techniques in a web-based environment by Jali, M.Z, Furnell, S.M, Dowland, P.S

    Published in Information management & computer security (01-01-2010)
    “…Purpose - The purpose of this paper is to assess the usability of two image-based authentication methods when used in the web-based environment. The evaluated…”
    Get full text
    Journal Article
  7. 7

    Towards an insider threat prediction specification language by Magklaras, G.B, Furnell, S.M, Brooke, P.J

    Published in Information management & computer security (01-08-2006)
    “…Purpose - This paper presents the process of constructing a language tailored to describing insider threat incidents, for the purposes of mitigating threats…”
    Get full text
    Journal Article
  8. 8

    Insider Threat Prediction Tool: Evaluating the probability of IT misuse by Magklaras, G.B, Furnell, S.M

    Published in Computers & security (2001)
    “…Despite the well documented and emerging insider threat to information systems, there is currently no substantial effort devoted to addressing the problem of…”
    Get full text
    Journal Article
  9. 9

    Achieving automated intrusion response: a prototype implementation by Papadaki, M, Furnell, S.M

    “…Purpose - The increasing speed and volume of attacks against networked systems highlights the need to automate the intrusion response process. This paper…”
    Get full text
    Journal Article
  10. 10

    Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks by Razak, S.A., Furnell, S.M., Clarke, N.L., Brooke, P.J.

    Published in Ad hoc networks (01-09-2008)
    “…Nowadays, a commonly used wireless network (i.e., Wi-Fi) operates with the aid of a fixed infrastructure (i.e., an access point) to facilitate communication…”
    Get full text
    Journal Article
  11. 11

    A long-term trial of alternative user authentication technologies by Furnell, S.M, Papadopoulos, I, Dowland, P

    Published in Information management & computer security (01-04-2004)
    “…Modern IT systems have a continued requirement for reliable user authentication at login. However, the majority of systems are still using username password…”
    Get full text
    Journal Article
  12. 12

    Co-operative user identity verification using an Authentication Aura by Hocking, C.G., Furnell, S.M., Clarke, N.L., Reynolds, P.L.

    Published in Computers & security (01-11-2013)
    “…IT usage today is typified by users that operate across multiple devices, including traditional desktop PCs, laptops, tablets and smartphones. As a…”
    Get full text
    Journal Article
  13. 13

    Keystroke dynamics on a mobile handset: a feasibility study by Clarke, N.L, Furnell, S.M, Lines, B.M, Reynolds, P.L

    Published in Information management & computer security (01-10-2003)
    “…The ability of third generation telephones to store sensitive information, such as financial records, digital certificates and company records, makes them…”
    Get full text
    Journal Article
  14. 14

    Analysis of security-relevant semantics of BPEL in cross-domain defined business processes by Fischer, K.P, Bleimann, U, Fuhrmann, W, Furnell, S.M

    “…Purpose - Aims to identify security-relevant semantics of business processes being defined by WS-BPEL (Web Services Business Process Execution Language, BPEL…”
    Get full text
    Journal Article
  15. 15

    A preliminary model of end user sophistication for insider threat prediction in IT systems by Magklaras, G.B., Furnell, S.M.

    Published in Computers & security (01-08-2005)
    “…The dangers that originate from acts of IT system misuse by legitimate users constitute a separate category of threats with well documented consequences for…”
    Get full text
    Journal Article
  16. 16

    An automated framework for managing security vulnerabilities by Al-Ayed, A, Furnell, S.M, Zhao, D, Dowland, P.S

    Published in Information management & computer security (01-04-2005)
    “…Purpose - This paper aims to look at unpatched software which represents a significant problem for internet-based systems, with a myriad malware incidents and…”
    Get full text
    Journal Article
  17. 17

    Risk and restitution: Assessing how users establish online trust by Lacohee, H., Phippen, A.D., Furnell, S.M.

    Published in Computers & security (01-10-2006)
    “…The belief that users must be assured of security prior to engaging with an online service is challenged through the examination of attitudes from participants…”
    Get full text
    Journal Article
  18. 18

    Security implications of electronic commerce: a survey of consumers and businesses by Furnell, S.M., Karweni, T.

    Published in Internet research (01-01-1999)
    “…Examines the general requirement for security technologies in order to provide a basis for trust in the e-commerce environment. The discussion is supported by…”
    Get full text
    Journal Article
  19. 19

    A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head by Rodwell, P.M., Furnell, S.M., Reynolds, P.L.

    Published in Computers & security (01-12-2007)
    “…This paper proposes and evaluates a non-intrusive biometric authentication technique drawn from the discrete areas of biometrics and Auditory Evoked Responses…”
    Get full text
    Journal Article
  20. 20

    Dissecting the "Hacker Manifesto" by Furnell, S.M, Dowland, P.S, Sanders, P.W

    Published in Information management & computer security (01-05-1999)
    “…Twelve years ago, a text was written within the hacking community which is widely referred to as the "Hacker Manifesto". This text, and the opinions that it…”
    Get full text
    Journal Article