Research Staff Profile

Home People Profile...

Prof. Steven M. Furnell BSc(Hons) PhD CEng FBCS CITP SMIEEE MInstISP PFHEA

Professor of Information Systems Security / Head of School

Brief biographical information

steven.furnell@plymouth.ac.uk

    

 

Prof. Steven Furnell is the head of the Centre for Security, Communications & Network Research at Plymouth University (UK), an Adjunct Professor with Edith Cowan University (Western Australia) and an Honorary Professor with Nelson Mandela Metropolitan University (South Africa). His interests include mobile device security, cybercrime, user authentication, and security usability. Prof. Furnell is the author of over 260 papers in refereed international journals and conference proceedings, as well as books including Cybercrime: Vandalizing the Information Society (2001) and Computer Insecurity: Risking the System (2005). He is also the editor-in-chief of Information & Computer Security, and the co-chair of the Human Aspects of Information Security & Assurance (HAISA) symposium (www.haisa.org). Steve is active in a variety of professional bodies, and is a Fellow of the BCS, a Senior Member of the IEEE, and a Board Member of the IISP.  Steve has also produced a variety of security podcasts, available via www.cscan.org/podcasts.

Research interests

Cybersecurity (including user authentication, cybercrime, human factors, intrusion detection, and security management)
Internet and WWW technologies
Mobile applications and services

Education/qualifications

1997-1998 SEDA Accredited Teacher of Higher Education, University of Plymouth
1992-1995 Ph.D., "Data Security in European Healthcare Information Systems"
1988-1992 B.Sc. (Hons) Computing and Informatics (1)

Professional memberships

Fellow, British Computer Society
Chair, British Computer Society South-West Branch
Chartered Engineer
Chartered Information Technology Professional
Chair, IFIP Technical Committee 11 (TC11) - Security and Privacy Protection in Information Processing Systems
Member, IFIP TC11 Working Group 11.1 on Information Security Management
Member, IFIP TC11 Working Group 11.8 on Information Security Education
Member, IFIP TC11 Working Group 11.12 on Human Aspects of Information Security and Assurance
Senior Member, Institute of Electrical and Electronic Engineers
Board Member, Institute of Information Security Professionals
Principal Fellow, Higher Education Academy

External appointments

Adjunct Professor, Edith Cowan University, Perth, Western Australia (2007-present)
Honorary Professor, Nelson Mandela Metropolitan University, South Africa (2015-present)

Journal papers

AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection
Feizollah A, Anuar NB, Salleh R, Suarez-Tangil G, Furnell SM
Computers & Security, Volume 65, Pages 121-134, 2017
More details | External link available

Evaluating the effect of guidance and feedback upon password compliance
Furnell SM, Esmael R
Computer Fraud & Security, Volume 2017, Issue 1, January, Pages 5-10, 2017
More details | External link available

Leveraging Biometrics for Insider Misuse Identification
Alruban A, Clarke NL, Li F, Furnell SM
International Journal on Cyber Situational Awareness (IJCSA), Vol. 1, No. 1, 2016, article 7, 2016
More details | External link available

The usability of security - revisited
Furnell SM
Computer Fraud & Security, ISSN: 1361-3723, September 2016, pp5-11, 2016
More details

Assessing Staff Acceptance and Compliance with Information Security
Alotaibi T, Furnell SM
International Journal of Computing Academic Research (IJCAR), ISSN 2305-9184, Volume 5, Number 4 (August 2016), pp.195-201, 2016
More details | External link available

A suspect-oriented intelligent and automated computer forensic analysis
Al Fahdi M, Clarke NL, Li F, Furnell SM
Digital Investigation, Volume 18, pp. 65-76, 2016
More details | External link available

Awareness of Mobile Device Security: A Survey of User's Attitudes
Clarke NL, Symes JE, Saevanee H, Furnell SM
International Journal of Mobile Computing and Multimedia Communications (IJMCMC), Vol 7, Iss 1, 2016
More details | External link available

A Novel Taxonomy for Mobile Applications Data
Alotaibi S, Furnell SM, Clarke NL
International Journal of Cyber-Security and Digital Forensics (IJCSDF), ISSN: 2305-0012, Vol. 5, No. 3, pp115-121, 2016
More details | External link available

A Fine-Grained Analysis of User Activity on Mobile Applications: The Sensitivity Level Perception
Alotaibi S, Furnell SM, Clarke NL
International Journal for Information Security Research (IJISR), Volume 5, Issue 3, pp591-599, 2015
More details | External link available

A Conceptual Model for Cultivating an Information Security Culture
Sherif E, Furnell SM
International Journal for Information Security Research (IJISR), Volume 5, Issue 2, pp565-573, 2015
More details | External link available

Secure Graphical One Time Password (GOTPass): An Empirical Study
Alsaiari H, Papadaki M, Dowland PS, Furnell SM
Information Security Journal: A Global Perspective, 24, pp207-220, 2015
More details | External link available

A forensic acquisition and analysis system for IaaS
Alqahtany S, Clarke NL, Furnell SM, Reich C
Cluster Computing, pp1-15, 2015
More details | External link available

Continuous and transparent multimodal authentication: reviewing the state of the art
Al Abdulwahid A, Clarke NL, Stengel I, Furnell SM, Reich C
Cluster Computing, pp1-20, 2015
More details | External link available

Continuous user authentication using multi-modal biometrics
Saevanee H, Clarke NL, Furnell SM, Biscioneb V
Computers & Security, Vol. 53, pp234-246, 2015
More details | External link available

The Price of Patching
Furnell SM, van Niekerk J, Clarke NL
Computer Fraud and Security, Issue 8, pp8-13, 2014
More details | External link available

Factors for Measuring Password-Based Authentication Practices
Mattord HJ, Levy Y, Furnell SM
Journal of Information Privacy and Security, pp71-94, 2014
More details | External link available

D-FICCA: A Density-based Fuzzy Imperialist Competitive Clustering Algorithm for Intrusion Detection in Wireless Sensor Networks
Shamshirband S, Amini A, Anuar NB, Kiah LM, Wah TY, Furnell SM
Measurement, Volume 55, September, pp212–226, 2014
More details | External link available

Investigating the Viability of Multifactor Graphical Passwords for User Authentication
Jali MZ, Furnell SM, Dowland PS
Information Security Journal: A Global Perspective, 00:1–12, ISSN: 1939-3555, Published online: 18 Apr 2014, 2014
More details | External link available

Co-operative user identity verification using an Authentication Aura
Hocking C, Furnell SM, Clarke NL, Reynolds PL
Computers & Security, Volume 39, Part B, November, pp486–502, 2013
More details | External link available

A response selection model for intrusion response systems: Response Strategy Model (RSM)
Anuar NB, Papadaki M, Furnell SM, Clarke NL
Security and Communication Networks, 2013
More details | External link available

Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM)
Anuar NB, Papadaki M, Furnell SM, Clarke NL
Security and Communication Networks, 2012
More details | External link available

Power to the people? The evolving recognition of human aspects of security
Furnell SM, Clarke NL
Computers & Security, Volume 31, Issue 8, pp983–988, 2012
More details | External link available

Authentication Aura - A distributed approach to user authentication
Hocking C, Furnell SM, Clarke NL, Reynolds PL
Journal of Information Assurance and Security, vol. 6 (2011), issue 2, pp149-156, ISSN 1554-1010, 2011
More details | External link available

Massively Multi-Player Online Role Playing Games: What’s the Risk?
Sanders B, Dowland PS, Atkinson S, Furnell SM
Journal of Virtual Worlds Research, vol. 3, no. 3, ISSN: 1941-8477, 2011
More details | External link available

Establishing A Personalized Information Security Culture
Talib S, Clarke NL, Furnell SM
International Journal of Mobile Computing and Multimedia Communications (IJMCMC), Vol 3, Iss 1, pp63-79, 2011
More details | External link available

Comparing Intentions to Use University-Provided vs. Vendor-Provided Multibiometric Authentication in Online Exams
Levy Y, Ramim MM, Furnell SM, Clarke NL
Campus-Wide Information Systems, Vol. 28 Iss: 2, 2011
More details

Online Addiction: A Cultural Comparison of Privacy Risks in Online Gaming Environments
Sanders B, Dowland PS, Atkinson S, Zahra D, Furnell SM, Papadaki M
Journal of Multimedia Processing Technologies, vol. 1, no. 3, September, pp181-193, ISSN: 0976-4127, 2010
More details | External link available

A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm
Tjhai GC, Furnell SM, Papadaki M, Clarke NL
Computers & Security, Volume 29, Issue 6, pp712-723 , 2010
More details | External link available

Assessing image-based authentication techniques in a web-based environment
Jali MZ, Furnell SM, Dowland PS
Information Management & Computer Security, Vol.18, Iss.1, pp43-53, 2010
More details | External link available

Mac security: An Apple that can't be bitten?
Furnell SM
Network Security, Volume 2010, Issue 1, pp7-11, 2010
More details | External link available

Social engineering: assessing vulnerabilities in practice
Bakhshi T, Papadaki M, Furnell SM
Information Management and Computer Security, vol. 17, no. 1, pp53-63, 2009
More details | External link available

From culture to disobedience: Recognising the varying user acceptance of IT security
Furnell SM, Thomson KL
Computer Fraud & Security, Volume 2009, Issue 2, February, pp5-10, 2009
More details | External link available

Scare tactics – A viable weapon in the security war?
Furnell SM, Papadaki M, Thomson KL
Computer Fraud & Security, Volume 2009, Issue 12, December, pp6-10, 2009
More details | External link available

A Friend Mechanism for Mobile Ad Hoc Networks
Razak SA, Samian N, Ma’arof MA, Furnell SM, Clarke NL, Brooke PJ
Journal of Information Assurance and Security, Volume 4, Issue 5, pp440-448, 2009
More details

Securing the next generation: enhancing e-safety awareness among young people
Atkinson S, Furnell SM, Phippen AD
Computer Fraud & Security, Volume 2009, Issue 7, pp13-19 , 2009
More details | External link available

From desktop to mobile: Examining the security experience
Botha RA, Furnell SM, Clarke NL
Computers & Security, Volume 28, Issues 3-4, pp130-137, 2009
More details | External link available

Security beliefs and barriers for novice Internet users
Furnell SM, Tsaganidi V-G, Phippen AD
Computers & Security, Volume 27, Issues 7-8, December, pp235-240 , 2008
More details | External link available

Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks
Razak SA, Furnell SM, Clarke NL, Brooke PJ
Ad Hoc Networks, Volume 6, Issue 7, September, pp1151-1167, 2008
More details | External link available

Who guides the little guy? Exploring security advice and guidance from retailers and ISPs
Furnell SM, Shams R, Phippen AD
Computer Fraud & Security, Volume 2008, Issue 12, December, pp6-10 , 2008
More details | External link available

Self-preservation among online prey
Furnell SM, Ward J
Computer Fraud & Security, Volume 2008, Issue 11, November, pp9-12 , 2008
More details | External link available

It's a jungle out there: Predators, prey and protection in the online wilderness
Furnell SM, Ward J
Computer Fraud & Security, Volume 2008, Issue 10, October, pp3-6 , 2008
More details | External link available

Beyond the PIN: Enhancing user authentication for mobile devices
Furnell SM, Clarke NL, Karatzouni S
Computer Fraud & Security, Volume 2008, Issue 8, pp12-17, 2008
More details | External link available

End-user security culture: A lesson that will never be learnt?
Furnell SM
Computer Fraud & Security, Volume 2008, Issue 4, April, pp6-9, 2008
More details | External link available

Testing our defences or defending our tests: the obstacles to performing security assessment
Furnell SM, Papadaki M
Computer Fraud & Security, Volume 2008, Issue 5, May, pp8-12, 2008
More details | External link available

Identity impairment: The problems facing victims of identity fraud
Furnell SM
Computer Fraud & Security, Volume 2007, Issue 12, December, pp6-11, 2007
More details | External link available

Considering the potential of criminal profiling to combat hacking
Preuss J, Furnell SM, Papadaki M
Journal in Computer Virology, vol. 3, no. 2 pp135-141, 2007
More details | External link available

A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head
Rodwell PM, Furnell SM, Reynolds PL
Computers and Security, Volume 26, Issues 7-8, pp468-478, 2007
More details

Making security usable: Are things improving?
Furnell SM
Computers & Security, Volume 26, Issue 6, pp434-443, 2007
More details

Assessing the security perceptions of personal Internet users
Furnell SM, Bryant P, Phippen AD
Computers & Security, Volume 26, Issue 5, pp410-417, 2007
More details

Phishing: can we spot the signs?
Furnell SM
Computer Fraud & Security, Issue 3, March, pp10-15, 2007
More details

Public awareness and perceptions of biometrics
Furnell SM, Evangelatos K
Computer Fraud & Security, Issue 1, January, pp8-13, 2007
More details

Analysis of security-relevant semantics of BPEL in cross-domain defined business processes
Fischer KP, Bleimann U, Fuhrmann W, Furnell SM
Information Management & Computer Security, Volume 15, Issue 2, pp116-127, 2007
More details

A new taxonomy for comparing intrusion detection systems
Tucker C, Furnell SM, Ghita BV, Brooke PJ
Internet Research, vol. 17, no. 1, pp88-98, 2007
More details

Advanced user authentication for mobile devices
Clarke NL, Furnell SM
Computers & Security, vol. 26, no. 2, pp109-119, 2007
More details

Malicious or misinformed? Exploring a contributor to the insider threat
Furnell SM
Computer Fraud & Security, September, pp8-12, 2006
More details

Securing the home worker
Furnell SM
Network Security, November, pp6-112, 2006
More details

Risk and Restitution: Assessing how users establish online trust
Lacohee H, Phippen AD, Furnell SM
Computers & Security, Vol. 25, No. 7, pp486-493, 2006
More details

Security mobile devices: technology and attitude
Furnell SM
Network Security, August, pp9-13, 2006
More details

A Composite User Authentication Architecture for Mobile Devices
Clarke NL, Furnell SM
Journal of Information Warfare, vol. 5, no. 2, pp11-29, 2006
More details

Towards an Insider Threat Prediction Specification Language
Magklaras GB, Furnell SM, Brooke PJ
Information Management & Computer Security, vol. 14, no. 4, pp361-381, 2006
More details

Authenticating Mobile Phone Users Using Keystroke Analysis
Clarke NL, Furnell SM
International Journal of Information Security, vol. 6, no. 1, pp1-14, 2006
More details

Safety in numbers? Early experiences in the age of chip and PIN
Furnell SM
Computer Fraud & Security, April, pp4-7, 2006
More details

Usability pitfalls in Wireless LAN Security
Furnell SM, Ghita BV
Network Security, March, pp4-8, 2006
More details

The challenges of understanding and using security: A survey of end-users
Furnell SM, Jusoh A, Katsabas D
Computers & Security, vol. 25, iss. 1, pp27-35, 2006
More details

Replacing passwords: In search of the secret remedy
Furnell SM, Zekri L
Network Security, January, pp 4-8, 2006
More details

The role of academic qualifications in the IT security profession
Furnell SM, Katos V, Clarke NL
DATAWATCH, Information Systems Audit and Control Association (ISACA) - London Chapter, Winter, pp8-15, 2005
More details | External link available

Barriers to usable security in end-user applications
Furnell SM, Jusoh A, Katsabas D, Phippen AD
eMinds: International Journal on Human-Computer Interaction, vol. 1, no. 1, pp51-59, 2005
More details | External link available

Informing the decision process in an automated intrusion response system
Papadaki M, Furnell SM
Information Security Technical Report, vol. 10, no. 3, pp150-161, 2005
More details | External link available

Authentication of users on mobile telephones - A survey of attitudes and practices
Clarke NL, Furnell SM
Computers & Security, vol. 24, no. 7, pp519-527, 2005
More details

Biometrics - The promise versus the practice
Clarke NL, Furnell SM
Computer Fraud and Security, September, pp12-16, 2005
More details

A Preliminary Model of End User Sophistication for Insider Threat Prediction in IT Systems
Magklaras GB, Furnell SM
Computers & Security, vol. 24, no. 5, pp371-380, 2005
More details

Why users cannot use security
Furnell SM
Computers & Security, vol. 24, pp274-279, 2005
More details | External link available

An automated framework for managing security vulnerabilities
Alayed A, Furnell SM, Zhao D, Dowland PS
Information Management & Computer Security, vol. 13, no. 2, pp156-166, 2005
More details

Biometrics: No silver bullets
Furnell SM, Clarke NL
Computer Fraud & Security, August, pp9-14, 2005
More details

Internet threats to end-users: Hunting easy prey
Furnell SM
Network Security, July, pp5-9, 2005
More details

Handheld hazards: The rise of malware on mobile devices
Furnell SM
Computer Fraud & Security, May, pp4-8, 2005
More details

Authenticating ourselves: will we ever escape the password?
Furnell SM
Network Security, March, pp8-13, 2005
More details

E-commerce security: a question of trust
Furnell SM
Computer Fraud & Security, October, pp10-14, 2004
More details

Qualified to help: In search of the skills to ensure security
Furnell SM
Computer Fraud and Security, December, pp10-14, 2004
More details

Malware comes of age: The arrival of the true computer parasite
Furnell SM, Ward J
Network Security, October, pp11-15, 2004
More details

Getting caught in the phishing net
Furnell SM
Network Security, May, pp14-18, 2004
More details

When vulnerability reports can work against us
Furnell SM
Network Security, June, pp11-15, 2004
More details

IDS or IPS: what is best?
Papadaki M, Furnell SM
Network Security, July, pp15-19, 2004
More details

Multi-Dimensional-Personalisation for the online & offline world
Schilke SW, Bleimann U, Furnell SM, Phippen AD
Internet Research, vol. 14, no. 5 pp379-385, 2004
More details | External link available

A long-term trial of alternative user authentication technologies
Furnell SM, Papadopoulos I, Dowland PS
Information Management and Computer Security, Vol. 12, No. 2, pp178-190, 2004
More details

Using security: easier said than done?
Furnell SM
Computer Fraud & Security, April, pp6-15, 2004
More details

Helping us to help ourselves: assessing administrators? use of security analysis tools
Furnell SM, Bolakis S
Network Security, February, pp12-15, 2004
More details

Hacking begins at home: Are company networks at risk from home computers?
Furnell SM
Computer Fraud & Security, January, pp4-7, 2004
More details

Vulnerability exploitation: the problem of protecting our weakest links
Furnell SM
Computer Fraud & Security, November, pp12-15, 2003
More details

The Effects of Audio and Video Correlation and Lip Synchronization
Mued L, Lines BL, Furnell SM, Reynolds PL
Campus Wide Information Systems, vol. 20, no. 4, pp. 159-166, 2003
More details | Download PDF

Keystroke Dynamics on a Mobile Handset: A Feasibility Study
Clarke NL, Furnell SM, Lines BL, Reynolds PL
Information Management and Computer Secuirty, vol. 11, no. 4, pp161-166, 2003
More details | Download PDF

Endpoint study of Internet paths and web pages transfers
Ghita BV, Furnell SM, Lines BL, Ifeachor E
Campus Wide Information Systems, vol. 20, no. 3, pp90-97, 2003
More details | Download PDF

A Model for Monitoring and Migrating Web Resources
Evans MP, Furnell SM
Campus Wide Information Systems, vol. 2, no. 2, pp67-74, 2003
More details | External link available

Considering the Problem of Insider IT Misuse
Furnell SM, Phyo AH
Australian Journal of Information Systems, vol. 10, no. 2, pp134-138, 2003
More details | Download PDF

Enhancing Response in Intrusion Detection Systems
Papadaki M, Furnell SM, Lee SJ, Lines BL, Reynolds PL
Journal of Information Warfare, vol. 2, no. 1, pp90-102, 2002
More details | Download PDF

A prototype tool for information security awareness and training
Furnell SM, Gennatou M, Dowland PS
International Journal of Logisitics Information Management, vol. 15, no. 5, pp352-357, 2002
More details | Download PDF

Assessing the global accessibility of the Internet
Ngini CU, Furnell SM, Ghita BV
Internet Research, vol. 12, no. 4, pp329-338, 2002
More details | Download PDF

An experimental comparison of secret-based user authentication technologies
Irakleous I, Furnell SM, Dowland PS, Papadaki M
Information Management and Computer Security, vol. 10, no. 3, pp100-108, 2002
More details | Download PDF

Insider Threat Prediction Tool: Evaluating the probability of IT misuse
Magklaras GB, Furnell SM
Computers & Security, vol. 21, no. 1, pp62-73, 2002
More details | Download PDF

Acceptance of subscriber authentication methods for mobile telephony devices
Clarke NL, Furnell SM, Rodwell PM, Reynolds PL
Computers & Security, vol. 21, no.3, pp220-228, 2002
More details | Download PDF

Categorising cybercrime and cybercriminals: The problem and potential approaches
Furnell SM
Journal of Information Warfare, vol. 1, no. 2. pp35-44, 2002
More details | Download PDF

The Resource Locator Service: Fixing a Flaw in the Web
Evans MP, Furnell SM
Computer Networks, vol. 37, no 3-4, November, 2001
More details | Download PDF

The promise of Online Distance Learning: Addressing academic and institutional concerns
Furnell SM, Evans MP, Bailey P
Quarterly Review of Distance Education, vol. 1, no. 4, pp281-291, 2001
More details | Download PDF

Network Quality of Service Monitoring for IP Telephony
Ghita BV, Furnell SM, Lines BL, Le Foll D, Ifeachor E
Internet Research, vol. 11, no. 1, pp26-34, 2001
More details | Download PDF

Security analysers: Administrator Assistants or Hacker Helpers?
Furnell SM, Chiliarchaki P, Dowland PS
Information Management and Computer Security, vol. 9, no.2, pp93-101, 2001
More details | Download PDF

Authentication and Supervision: A survey of user attitudes
Furnell SM, Dowland PS, Illingworth HM, Reynolds PL
Computers & Security, vol. 19, no. 6, pp529-539, 2000
Please note: the electronic copy of the survey referred to in this paper is no longer available.
More details | Download PDF

Internet-based security incidents and the potential for false alarms
Evans MP, Furnell SM
Internet Research, vol. 10, no. 3, pp238-245, 2000
More details | Download PDF

A conceptual architecture for real-time intrusion monitoring
Furnell SM, Dowland PS
Information Management and Computer Security, vol. 8, no. 2, pp65-74, 2000
More details | Download PDF

Computer Crime and Abuse: A Survey of Public Attitudes and Awareness
Dowland PS, Furnell SM, Illingworth HM, Reynolds PL
Computers & Security, vol. 18, no. 8, pp715-726, 1999
Please note: the electronic copy of the survey referred to in this paper is no longer available.
More details | Download PDF

A new approach towards security training and awareness amongst the Healthcare Community
Warren MJ, Furnell SM, Sanders P
Informatics in Healthcare Australia, vol. 8, no. 1, pp20-26, 1999
More details | Download PDF

Security implications of Electronic Commerce: A Survey of Consumers and Businesses
Furnell SM, Karweni T
Internet Research, vol. 9, no. 5, pp372-382, 1999
More details | Download PDF

Computer Hacking and Cyber Terrorism: The real threats in the new millenium?
Furnell SM, Warren MJ
Computers & Security, vol. 18, no. 1, pp28-34, 1999
More details | Download PDF

Online Distance Learning: Expectations, Requirements and Barriers
Furnell SM, Evans MP, Phippen AD, Abu-Rgheff MA
Virtual University Journal, vol. 2, no. 2, 1999
More details | Download PDF

Dissecting the 'Hacker Manifesto'
Furnell SM, Dowland PS, Sanders P
Information Management and Computer Security, vol.7, no.2 pp69-75, 1999
More details | Download PDF

Strategies for Content Migration on the World Wide Web
Evans MP, Phippen AD, Müller G, Furnell SM, Sanders P, Reynolds PL
Internet Research, vol.9, no.1, pp25-34, 1999
More details | Download PDF

The ISHTAR guidelines for healthcare security
Furnell SM, Davey J, Gaunt PN, Louwerse CP, Mavroudakis K, Treacher AH
Health Informatics Journal, vol.4, no. 3/4, pp179-183, 1998
NB paper has been scanned from printed copy. We apologise for the screen quality of this paper.
More details | Download PDF

A security framework for online distance learning and training
Furnell SM, Onions PD, Bleimann U, Gojny U, Knahl MH, Röder HF, Sanders P
Internet Research, vol. 8, no. 3, pp236-242, 1998
More details | Download PDF

Network Resource Adaptation in the DOLMEN Service Machine
Evans MP, Kettunen KT, Blackwell GK, Furnell SM, Phippen AD, Hope S, Reynolds PL
Intelligence in Services and Networks: Technology for Cooperative Competition, Mullery et al. (eds.), Springer, 1997
More details

Assessing staff attitudes towards information security in a European healthcare establishment
Furnell SM, Gaunt PN, Holben RF, Sanders P, Stockel CT, Warren MJ
Medical Informatics, vol. 21, no. 2, pp105-112, 1997
NB paper has been scanned from printed copy. We apologise for the screen quality of this paper.
More details | Download PDF

ODESSA - A New Approach to Healthcare Risk Analysis
Warren MJ, Furnell SM, Sanders P
Information Security in Research and Business, Chapman & Hall, pp391-402, 1997
NB paper has been scanned from printed copy. We apologise for the screen quality of this paper.
More details | Download PDF

Computer abuse : Vandalising the information society
Furnell SM, Warren MJ
Internet Research, vol. 7, no.1, pp61-66, 1996
NB paper has been scanned from printed copy. We apologise for the screen quality of this paper.
More details | Download PDF

Development of Security Guidelines for Existing Healthcare Systems
Furnell SM, Sanders P, Warren MJ
Medical Informatics, vol. 20, no. 3, pp139-148, 1995
NB paper has been scanned from printed copy. We apologise for the screen quality of this paper.
More details | Download PDF

A Generic Methodology for Health Care Data Security
Furnell SM, Gaunt PN, Pangalos G, Sanders P, Warren MJ
Medical Informatics, vol 19, no. 3, pp229-445, 1994
NB paper has been scanned from printed copy. We apologise for the screen quality of this paper.
More details | Download PDF

123 Journal papers

Conference papers

Insider Misuse Identification using Transparent Biometrics
Clarke NL, Li F, Alruban A, Furnell SM
Proceedings of the 50th Hawaii International Conference on System Sciences, January 04 - 07, Hawaii USA, 2017
More details | External link available

Information Security Policies: A Review of Challenges and Influencing Factors
Alotaibi M, Furnell SM, Clarke NL
11th International Conference for Internet Technology and Secured Transactions (ICITST), pp 352-358, Barcelona, Spain, 2016
More details | External link available

User profiling from network traffic via novel application-level interactions
Alotibi G, Clarke NL, Li F, Furnell SM
11th International Conference for Internet Technology and Secured Transactions (ICITST), pp 279-285, Barcelona, Spain, 2016
More details | External link available

A Forensic Acquisition and Analysis System for IaaS: Architectural Model and Experiment
Alqahtany S, Clarke NL, Furnell SM, Reich C
11th International Conference on Availability, Reliability and Security, 31 August -2 September, 2016
More details | External link available

Proactive Biometric-Enabled Forensic Imprinting
Alruban A, Clarke NL, Li F, Furnell SM
International Conference on Cyber Incident Response, Coordination, Containment & Control (Cyber Incident 2016), June 13-14, London, UK, 2016
Winner of the Best Paper Award (Cyber Incident 2016)
More details

Information Security and Practice: The User's Perspective
Clarke NL, Li F, Furnell SM, Stengel I, Ganis G
Proceedings of the 11th International Conference On Cyber Warfare and Security (ICCWS-2016), pp81-89, ISSN:2048-9870, ISBN:9781910810835, 17-18 March 2016, Boston, USA, 2016
More details

Transparent Authentication Systems for Mobile Device Security: A Review
Alotaibi S, Furnell SM, Clarke NL
10th International Conference for Internet Technology and Secured Transactions (ICITST), 14-16 Dec, pp. 406-413, 2015
More details | External link available

A Review of Graphical Authentication Utilising a Keypad Input Method
Alsaiari H, Papadaki M, Dowland PS, Furnell SM
Proceedings of The 8th Saudi Students Conference, January 31 - February 1, pp359-374, 2015
More details | External link available

Towards Dynamic Adaption of User's Organisational Information Security Behaviour
Alotaibi M, Furnell SM, Clarke NL
Proceedings of the 13th Australian Information Security Management Conference (AISM2015), Perth, Australia, pp28-36, ISBN 0-7298-0733-9, 2015
More details

Security, Privacy and Usability - A Survey of Users' Perceptions and Attitudes
Al Abdulwahid A, Clarke NL, Furnell SM, Stengel I, Reich C
12th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2015), Valencia, Spain, September 1-2, pp153-168, ISBN 978-3-319-22906-5, 2015
More details | External link available

A Survey of Continuous and Transparent Multibiometric Authentication Systems
Al Abdulwahid A, Clarke NL, Furnell SM, Stengel I, Reich C
Proceedings of the 14th European Conference on Cyber Warfare and Security (ECCWS-2015), pp 1-10, ISBN: 978--91081-2-3, ISSN: 204-8610, 2015
More details | External link available

The Current Use of Authentication Technologies: An Investigative Review
Al Abdulwahid A, Clarke NL, Stengel I, Furnell SM, Reich C
Proceedings of the IEEE 2015 International Conference on Cloud Computing (ICCC15), pp 239-246, ISBN 15: 978-1-4673-6618-2, 2015
More details | External link available

Cloud Forensics: A Review of Challenges, Solutions and Open Problems
Alqahtany S, Clarke NL, Furnell SM, Reich C
Proceedings of the IEEE 2015 International Conference on Cloud Computing (ICCC15), pp 88-96, ISBN 15: 978-1-4673-6618-2, 2015
More details

Behavioral-Based Feature Abstraction from Network Traffic
Alotibi G, Li F, Clarke NL, Furnell SM
10th International Conference on Cyber warfare and Security, Kruger National Park, South Africa, 24-25 March, pp1-9, ISBN 978-1-910309-97-1, 2015
More details

Text-Based Active Authentication for Mobile Devices
Saevanee H, Clarke NL, Furnell SM, Biscioneb V
29th IFIP TC11 International Conference on ICT Systems Security & Privacy Protection, Marrakech, Morocco, 2-4 June 2014, pp 99-112, ISBN: 978-3-642-55414-8, 2014
More details | External link available

A Forensically-Enabled IAAS Cloud Computing Architecture
Alqahtany S, Clarke NL, Furnell SM, Reich C
Proceedings of the 12th Australian Digital Forensics Conference, pp75-83, ISBN: 978-0-7298-0719-7, 2014
More details | External link available

A User-oriented Network Forensic Analyser: The Design of a High-Level Protocol Analyser
Joy D, Li F, Clarke NL, Furnell SM
Proceedings of the 12th Australian Digital Forensics Conference, 1-3 December, ECU Joondalup Campus, Perth, Western Australia, pp 84-93, ISBN 978-0-7298-0719-7, 2014
More details

Performance Evaluation of A Technology Independent Security Gateway for Next Generation Networks
Li F, Clarke NL, Furnell SM, Mkwawa IH
Wireless and Mobile Computing, Networking and Communications (WiMob), IEEE 10th International Conference on Emergency Networks for Public Protection and Disaster Relief, 8-10 October 2014 in Larnaca, Cyprus, page 281-286, 2014
More details | External link available

Towards A Unified OAI-PMH Registry
Goebert S, Harriehausen-Mühlbauer B, Furnell SM
Proceedings of the 11th IS&T Archiving Conference, pp97-100, ISBN: 978-0-89208-309-1, 2014
More details

Alternative Graphical Authentication for Online Banking Environments
Alsaiari H, Papadaki M, Dowland PS, Furnell SM
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2014), Plymouth, UK, July 8-9, pp122-136, ISBN: 978-1-84102-375-5, 2014
Can be ordered on-line.
More details | Download PDF

Cloud Forensics Challenges
Alqahtany S, Clarke NL, Furnell SM
Proceedings of the 7th SSC Saudi Students Conference - UK, pp86-93, ISBN: 9780956904522, 2014
More details | External link available

Towards an Automated Forensic Examiner (AFE) Based upon Criminal Profiling & Artificial Intelligence
Al Fahdi M, Clarke NL, Furnell SM
Proceedings of the 11th Australian Digital Forensics Conference, Perth, Australia, 2-4 December, pp 1-9, ISBN 978-0-7298-0711-1, 2013
More details

A Conceptual Model for Federated Authentication in the Cloud
Al Abdulwahid A, Clarke NL, Furnell SM, Stengel I
Proceedings of the 11th Australian Information Security Management Conference (AISM2013), Perth, Australia, 2-4 December, pp 1-11, ISBN 978-0-7298-0710-4, 2013
More details | External link available

A Technology Independent Security Gateway for Future Emergency Telecommunication Systems (ETS)
Li F, Clarke NL, Furnell SM, Fajardo JO, Liberal F, Sidibe M
Proceeding of the International Workshop on Emergency Telecommunications Systems (ETS 2013), Wrexham, UK, 12 September, pp299-308, 2013
More details

Challenges to Digital Forensics: A Survey of Researchers & Practitioners Attitudes and Opinions
Al Fahdi M, Clarke NL, Furnell SM
Proceedings of ISSA (Information Security South Africa), Johannesburg, 14-16 August, ISBN:978-1-4799-0809-7, 2013
More details

Towards Continuous and Convenient User Authentication
Furnell SM, Clarke NL
The Future of Identity: A compilation of research papers from a workshop, City University London / EPSRC, April, 2013
More details

E-Invigilator: A Biometric-Based Supervision System for e-Assessments
Clarke NL, Dowland PS, Furnell SM
The International Conference on Information Society (i-Society 2013), Toronto, Canada, 24-26 June, 2013
More details

A Technology Independent Security Gateway for Real-Time Multimedia Communication
Li F, Clarke NL, Furnell SM
Proceedings of the 7th International Conference on Network and System Security (NSS2013), 3-4 June 2013, Madrid, Spain, pp14-25, 2013
More details

Assessing the usability of application level security warnings
Zaaba ZF, Furnell SM, Dowland PS, Stengel I
Eleventh Annual Security Conference, Las Vegas, Nevada, US, 11-13 April, 2012
More details

A Response Strategy Model for Intrusion Response Systems
Anuar NB, Papadaki M, Furnell SM, Clarke NL
27th IFIP International Information Security and Privacy Conference - SEC2012, Heraklion, Crete, Greece, 4-6 June, pp573-578, 2012
More details

The Insider Threat Prediction and Specification Language
Magklaras GB, Furnell SM
Proceedings of the Ninth International Network Conference (INC2012), Port Elizabeth, South Africa, July, ISBN: 978-1-84102-315-1, pp51-61, 2012
Can be ordered on-line.
More details | Download PDF

A Novel Security Architecture for a Space-Data DTN
Clarke NL, Katos V, Menesidou SA, Ghita BV, Furnell SM
10th International Conference on Wired/Wireless Internet Communications – WWIC 2012, Santorini, Greece, June 6-8, pp342-349, 2012
More details | External link available

Multi-Modal Behavioural Biometric Authentication for Mobile Devices
Saevanee H, Clarke NL, Furnell SM
27th IFIP International Information Security and Privacy Conference - SEC2012, Heraklion, Crete, Greece, 4-6 June, pp465-474, 2012
More details

A Risk Index Model for Security Incident Prioritisation
Anuar NB, Furnell SM, Papadaki M, Clarke NL
Proceedings of the 9th Australian Information Security Management Conference (ASIM 2011), Perth, Australia, 5-7 December, 2011
More details

A preliminary investigation of distributed and cooperative user authentication
Hocking C, Furnell SM, Clarke NL, Reynolds PL
Proceedings of the 9th Australian Information Security Management Conference (secAU 2011), Perth, Australia, 5-7 December, 2011
More details

Multifactor Graphical Passwords: An Assessment of End-User Performance
Jali MZ, Furnell SM, Dowland PS
Proceedings of the 7th International Conference of Information Assurance & Security (IAS2011), Melaka, Malaysia, 5-8 December 2011. IEEE 978-1-4577-2153-3, 2011
More details

Quantifying the effect of graphical password guidelines for better security
Jali MZ, Furnell SM, Dowland PS
Future Challenges in Security and Privacy for Academia and Industry (SEC 2011), Lucerne, Switzerland, 7-9 June 2011. Volume 354/2011, Springer-Verlag, pp80-91, 2011
More details | External link available

SMS Linguistic Profiling Authentication on Mobile Devices
Saevanee H, Clarke NL, Furnell SM
5th International Conference on Network and System Security (NSS 2011), p224-229, 2011
More details

Emerging risks in massively multiplayer online role playing games
Sanders B, Atkinson S, Dowland PS, Furnell SM, Papadaki M
EU Kids Online Conference, Friday 23 September, New Academic Building LSE, 2011
More details | External link available

End-User Perception and Usability of Information Security
Zaaba ZF, Furnell SM, Dowland PS
Proceedings of the Fifth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2011), London, UK, ISBN: 978-1-84102-284-0, pp97-107, 2011
Can be ordered on-line.
More details | Download PDF

LUARM – An Audit Engine for Insider Misuse Detection
Magklaras GB, Furnell SM, Papadaki M
Proceedings of the Sixth International Workshop on Digital Forensics & Incident Analysis (WDFIA 2011), London, UK, ISBN: 978-1-84102-285-7, pp133-148, 2011
Can be ordered on-line.
More details | Download PDF

Towards a Flexible, Multi-Level Security Framework for Mobile Devices
Clarke NL, Karatzouni S, Furnell SM
Proceedings of the 10th Security Conference, Las Vegas, USA, 4-6 May, 2011
More details | Download PDF

Behavioural Biometric Authentication For Mobile Devices
Saevanee H, Clarke NL, Furnell SM
Proceedings of the Collaborative European Research Conference (CERC2011), 14-15 January, Cork, Ireland, ISSN: 2220-4164, pp175-184, 2011
More details

Barriers to E-Safety Peer Education: An analysis of teacher concerns
Atkinson S, Furnell SM, Phippen AD
Proceedings of E-Youth Conference, Antwerp, 27-28 May, 2010
More details | Download PDF

Online Addiction: Privacy Risks in Online Gaming Environments
Sanders B, Chen V, Zahra D, Dowland PS, Atkinson S, Papadaki M, Furnell SM
Proceedings of the International Conference on Management of Emergent Digital EcoSystems (MEDES), October 26-29, Bangkok, Thailand, 2010
More details

Assessing the Usability of End-User Security Software
Ibrahim T, Furnell SM, Papadaki M, Clarke NL
Lecture Notes in Computer Science, Volume 6264/2010, pp177-189, 2010
More details | External link available

A distributed and cooperative user authentication framework
Hocking C, Furnell SM, Clarke NL, Reynolds PL
Proceedings of the 6th International Confernece on Information Assurance and Security (IAS 2010), Atlanta, USA, 23-25 August, pp304-310, 2010
More details

An investigation and survey of response options for Intrusion Response Systems (IRSs)
Anuar NB, Papadaki M, Furnell SM, Clarke NL
Proceedings of the 9th Annual Information Security South Africa Conference, Sandton, South Africa, 2 - 4 August, pp1-8, ISBN: 978-1-4244-5493-8, 2010
More details | External link available

Psycho-Analytical Considerations in Internet Marketing – Focusing on Human Needs and Personal Trust
Rimbach F, Bleimann U, Furnell SM
Proceedings of the Eighth International Network Conference (INC 2010), Heidelberg, Germany, 8-10 July, ISBN: 978-1-84102-259-8, pp345-354, 2010
Can be ordered on-line.
More details | Download PDF

Implications and Risks of MMORPG Addiction: Motivations, Emotional Investment, Problematic Usage and Personal Privacy
Sanders B, Dowland PS, Furnell SM
Proceedings of the South African Information Security Multi-Conference (SAISMC 2010), Port Elizabeth, South Africa, 17-18 May, ISBN: 978-1-84102-256-7, pp61-73, 2010
Can be ordered on-line.
More details | Download PDF

An Analysis of Information Security Awareness within Home and Work Environments
Talib S, Clarke NL, Furnell SM
Fifth International Conference on Availability, Reliability and Security (“ARES 2010 – The International Dependability Conference”), Krakow, Poland, 15-18th Feb, , 2010
More details | Download PDF

Playing safe: A prototype game for raising awareness of social engineering
Newbould M, Furnell SM
Proceedings of the 7th Australian Information Security Management Conference (SECAU 2009), 1-3 December, Perth, Australia, On-line proceedings only, 2009
More details | External link available

Automated precautionary measures for managing system security vulnerabilities
Zhao D, Furnell SM, Alayed A
International Conference on E-Business and Information System Security, EBISS 2009, 23-24 May, Wuhan, China, pp1-5, ISBN: 9781424429097, 2009
More details | External link available

The research on a patch management system for enterprise vulnerability update
Zhao D, Furnell SM, Alayed A
International Conference on Information Engineering, ICIE 2009, 10-11 July, Taiyuan, Shanxi, China, pp250-253, ISBN: 978-0-7695-3679-8, 2009
More details | External link available

Improving Awareness of Social Engineering Attacks
Smith A, Papadaki M, Furnell SM
Proceedings of the 9th IFIP World Congress on Computer Education (WCCE 2009), Bento Gonclaves, Brazil, 27-31 July, 2009
More details

Evaluating Web-Based User Authentication using Graphical Techniques
Jali MZ, Furnell SM, Dowland PS
Proceedings of the Third International Symposium on Human Aspects of Information Security & Assurance (HAISA 2009), Athens, Greece, ISBN: 978-1-84102-231-4, pp108-118, 2009
Can be ordered on-line.
More details | Download PDF

An Assessment of People’s Vulnerabilities in Relation to Personal and Sensitive Data
Sanders B, Dowland PS, Furnell SM
Proceedings of the Third International Symposium on Human Aspects of Information Security & Assurance (HAISA 2009), Athens, Greece, ISBN: 978-1-84102-231-4, pp50-60, 2009
Can be ordered on-line.
More details | Download PDF

Assessing the Usability of Personal Internet Security Tools
Ibrahim T, Furnell SM, Papadaki M, Clarke NL
8th European Conference on Information Warfare and Security (ECIW), Military Academy, Lisbon & the University of Minho, Braga, Portugal, 6-7 July, 2009
More details | Download PDF

Risk culture influences in Internet safety and security
Atkinson S, Furnell SM, Phippen AD
Proceedings of the Third International Symposium on Human Aspects of Information Security & Assurance (HAISA 2009), Athens, Greece, ISBN: 978-1-84102-231-4, pp61-70, 2009
Can be ordered on-line.
More details

Using peer education to encourage safe online behaviour
Atkinson S, Furnell SM, Phippen AD
EU Kids Online, London School of Economics (online proceedings), 2009
More details | Download PDF | External link available

E-Safety and E-Security: Raising security awareness among young people using peer education
Atkinson S, Furnell SM, Phippen AD
Proceedings of the 8th Security Conference, April, Las Vegas, USA, 2009
More details | Download PDF

Flexible and Transparent User Authentication for Mobile Devices
Clarke NL, Karatzouni S, Furnell SM
Proceedings of the 24th IFIP TC 11 International Information Security Conference, Pafos, Cyprus, May 18-20, ISBN: 978-3-642-01243-3, pp1-12, 2009
More details

Evaluating the usability impacts of security interface adjustments in Word
Helala M, Furnell SM, Papadaki M
Proceedings of 6th Australian Information Security Management Conference, Perth, Western Australia, 1-3 December, pp48-55, 2008
More details | Download PDF

Effective Information Assurance for SMEs
Dimopoulos V, Furnell SM, Clarke NL
Proceedings of he 11th Annual Working Conference on Information Security Management, 16-17 October, Richmond, USA, pp27-45, ISBN: 978-3-901882-31-9, 2008
Can be ordered on-line.
More details | Download PDF

The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset
Tjhai GC, Papadaki M, Furnell SM, Clarke NL
Lecture Notes in Computer Science, Volume 5185/2008, ISBN: 978-3-540-85734-1, pp139-150, 2008
More details | External link available

Investigating the problem of IDS false alarms: An experimental study using Snort
Tjhai GC, Papadaki M, Furnell SM, Clarke NL
Proceeding of the 23rd International Information Security Conference (SEC 2008), Milan, Italy, 8-10 September, pp253-267, 2008
More details

Neural Network Estimation of TCP Performance
Ghita BV, Furnell SM
Proceedings of the 2008 International Conference on Communication Theory, Reliability, and Quality of Service (CTRQ 2008), Bucharest, Romania, 29 June – 5 July, pp53-58, 2008
More details | External link available

A Practical Assessment of Social Engineering Vulnerabilities
Bakhshi T, Papadaki M, Furnell SM
Proceedings of the Second International Symposium on Human Aspects of Information Security & Assurance (HAISA 2008), Plymouth, UK, pp12-23, 2008
Can be ordered on-line.
More details | Download PDF

Assessing the challenges of Intrusion Detection Systems
Ibrahim T, Furnell SM, Papadaki M, Clarke NL
Proceedings of the 7th Security Conference, Las Vegas, USA, 2nd-3rd June, 2008
More details | Download PDF

Transparent Facial Recognition for Mobile Devices
Clarke NL, Karatzouni S, Furnell SM
Proceedings of the 7th Security Conference, Las Vegas, USA, 2nd-3rd June, 2008
More details | Download PDF

Device- versus Network-Centric Authentication Paradigms for Mobile Devices: Operational and Perceptual Trade-Offs
Karatzouni S, Clarke NL, Furnell SM
5th Australian Information Security Management Conference, Mount Lawley, Australia, 5th December, 2007
More details | Download PDF

Building a Trusted Community for Mobile Ad Hoc Networks Using Friend Recommendation
Razak SA, Furnell SM, Clarke NL, Brooke PJ
Ad-Hoc, Mobile, and Wireless Networks, LNCS, vol: 4686/2007, pp129-141, 2007
More details | External link available

Pre-execution Security Policy Assessment of Remotely Defined BPEL-Based Grid Processes
Fischer KP, Bleimann U, Furnell SM
Proceedings of the 4th International Conference on Trust, Privacy & Security in Digital Business, September 3 – 7, Regensburg, Germany, ISBN: 978-3-540-74408-5, pp178-189, 2007
More details

Utilising Biometrics for Transparent Authentication on Mobile Devices
Karatzouni S, Clarke NL, Furnell SM
Proceedings of the 2nd International Conference on Internet Technologies and Applications, 4-7 September, Wrexham, UK, ISBN: 978-0-946881-54-3, pp549–557, 2007
More details | Download PDF | External link available

A practical usability evaluation of security features in end-user applications
Furnell SM, Katsabas D, Dowland PS, Reid F
Proceedings of the 22nd IFIP International Information Security Conference (IFIP SEC 2007), Sandton, South Africa, 14-16 May, pp. 205-216, 2007
More details

Security Policy Enforcement in BPEL-Defined Collaborative Business Processes
Fischer KP, Bleimann U, Fuhrmann W, Furnell SM
Proceedings of the 1st International Workshop on Security Technologies for Next Generation Collaborative Business Applications (SECOBAP 07), April 15-16 & 20, Istanbul, Turkey, ISBN: 1-4244-0832-6, pp 685-694, 2007
More details

Perceptions of User Authentication on Mobile Devices
Karatzouni S, Furnell SM, Clarke NL, Botha RA
Proceedings of the ISOneWorld Conference, Las Vegas, USA, April 11-13, CD Proceedings (0-9772107-6-6), 2007
More details | Download PDF

Assessing the usability of system-initiated and user-initiated security events
Furnell SM, Chatziapostolou D
Proceedings of the ISOneWorld Conference, Las Vegas, USA, April 11-13, CD Proceedings (0-9772107-6-6), 2007
More details | Download PDF

Considering the Usability of End-User Security Software
Furnell SM, Jusoh A, Katsabas D, Dowland PS
Proceedings of 21st IFIP International Information Security Conference (IFIP SEC 2006), Karlstad, Sweden, 22-24 May, pp307-316, 2006
More details

Assessing the usability of WLAN security for SOHO users
Ghita BV, Furnell SM
Proceedings of the Fifth Security Conference 2006, Las Vegas, USA, 19-20 April, CD Proceedings Only, 2006
More details | Download PDF

A New Taxonomy for Intrusion Detection
Tucker C, Furnell SM, Ghita BV, Brooke PJ
Proceedings of the Sixth International Network Conference (INC2006), Plymouth, UK, 11-14 July, pp253-260, 2006
More details | Download PDF

Security-Relevant Semantic Patterns of BPEL in Cross-Organisational Business Processes
Fischer KP, Bleimann U, Fuhrmann W, Furnell SM
Proceedings of the Sixth International Network Conference (INC2006), Plymouth, UK, 11-14 July, pp203-212, 2006
More details | Download PDF

From Page Ranking to Topic Sensitive Page Ranking: Implementation and Impact
Rimbach F, Dannenberg M, Bleimann U, Furnell SM
Proceedings of the Sixth International Network Conference (INC2006), Plymouth, UK, 11-14 July, pp27-34, 2006
More details | Download PDF

Enhancing Privacy Through Anonymous Recommendation for Multi-Dimensional-Personalisation
Schilke SW, Furnell SM, Bleimann U, Phippen AD
Proceedings of the 5th Security Conference, April 19-20, Las Vegas, USA, ISBN: 0-9772107-2-3, 2006
Full proceedings available here.
More details | Download PDF

A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks – A Friend Approach
Razak SA, Furnell SM, Clarke NL, Brooke PJ
Proceedings of the IEEE International Conference on Intelligence and Security Informatics Conference (ISI 2006), San Diego, CA, USA, pp590-595, May 23-24, 2006
More details | External link available

Attack Pattern Analysis: Trends in Malware Variant Development
Papadaki M, Furnell SM, Clarke NL, Abu-Bakar UA, Pinkney G
Proceedings of the 5th Security Conference, Las Vegas, April 19 -20, 2006
More details

Considering the Security Challenges in Consumer-Oriented eCommerce
Furnell SM
Proceedings of The 5th IEEE International Symposium on Signal Processing and Information Technology, Athens, Greece, 18-21 December, pp534-539, 2005
More details

Considering the role of academic qualifications for IT security professionals
Furnell SM, Katos V, Clarke NL
Proceedings of the 1st Colloquium for Information Systems Security Education, Asia Pacific, Adelaide, Australia, 21-22 November, pp1-11, 2005
More details

User Authentication for Mobile Devices: A Composite Approach
Clarke NL, Furnell SM
Proceedings of the 6th Australian Information Warfare and Security Conference, Geelong, Australia, 25-26 November, pp48-56, 2005
More details | Download PDF

A protection profiles approach to risk analysis for small and medium enterprises
Dimopoulos V, Furnell SM
Proceedings of IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference on Security Management, Integrity, and Internal Control in Information Systems, Fairfax, Virginia, 1-2 December, pp267-283, 2005
More details

A Chinese Wall Approach for Anonymous Recommendation in a Multi-Dimensional-Personalisation Scenario
Schilke SW, Bleimann U, Furnell SM, Phippen AD
Proceedings of Sciences Electroniques, Technologies de l'Information et des Telecommunications (SETIT) 2005, 27-31 March 2005, p155 (abstract), ISBN: 9973-51-546-3, 2005
Full paper available on the CD
More details | Download PDF

HTTP-Aware Anonymisation of Packet Traces
Salama E, Ghita BV, Furnell SM
Proceedings of the First International Conference on Internet Technologies and Applications, Wrexham, UK, 7-9 September, pp 421-431, 2005
More details

A Two-tier Intrusion Detection System for Mobile Ad Hoc Networks
Razak SA, Furnell SM, Brooke PJ
Proceedings of the Fourth European Conference on Information Warfare and Security, Glamorgan, South Wales, 11-12 July, 2005
CD Only Proceedings
More details

Artificial Impostor Profiling for Keystroke Dynamics on a Mobile Handset
Lecomte J, Clarke NL, Furnell SM
Proceedings of Fifth International Network Conference (INC 2005), July 5-7, Samos, Greece, pp199-206, 2005
More details | Download PDF

TCP Performance Estimation Using Neural Networks Modelling
Ghita BV, Furnell SM, Lines BL, Ifeachor E
Proceedings of Fifth International Network Conference (INC 2005), July 5-7, Samos, Greece, pp19-30, 2005
More details | Download PDF

A Security Infrastructure for Cross-Domain Deployment of Script-Based Business Processes in SOC Environments
Fischer KP, Bleimann U, Fuhrmann W, Furnell SM
Proceedings of Fifth International Network Conference (INC 2005), July 5-7, Samos, Greece, pp207-216, 2005
More details | Download PDF

Using Human Computer Interaction principles to promote usable security
Katsabas D, Furnell SM, Dowland PS
Proceedings of Fifth International Network Conference (INC 2005), July 5-7, Samos, Greece, pp235-242, 2005
More details | Download PDF

Organisational Security Culture: Embedding Security Awareness, Education and Training
Furnell SM, Clarke NL
Proceedings of the 4th World Conference on Information Security Education WISE 2005, 18-20 May, Moscow, Russia, pp67-74, 2005
More details | Download PDF

Intrusion Detection via Behavioural Profiling on Mobile and Wireless Networked Devices
Zincir I, Furnell SM, Phippen AD
Proceedings of the 11th Annual Euromedia Conference 2005, Toulouse, France, 11-13 April, pp67-71, 2005
More details | Download PDF

Identifying the security requirements for virtual university environments
Ruiz VC, Furnell SM, Phippen AD, Dowland PS, Stengel I, Bleimann U
Proceedings of the Fourth Security Conference 2005, Las Vegas, USA, 30-31 March, 2005
More details | Download PDF

Effective IT Security for Small and Medium Enterprises
Dimopoulos V, Furnell SM
Proceedings of the Fourth Security Conference 2005, Las Vegas, USA, 30-31 March, 2005
More details | Download PDF

PassImages : an alternative method of user authentication
Charruau D, Furnell SM, Dowland PS
Proceedings of the ISOneWorld 2005, Las Vegas, USA, 30 March - 1 April, 2005
More details | Download PDF

Insider Misuse Threat Survey: Investigating IT misuse from legitimate users
Magklaras GB, Furnell SM
Proceedings of the 5th Australian Information Warfare & Security Conference, Perth Western Australia, 25-26 November, CDROM, pp42-51, 2004
More details

Behavioural Profiling In Wireless Networks
Zincir I, Furnell SM, Phippen AD
Proceedings of the 5th Annual Postgraduate Conference PGNet 2004, 28-29 June, Liverpool, UK, pp128-133, 2004
More details | Download PDF

A Framework for Monitoring Insider Misuse of IT Applications
Phyo AH, Furnell SM, Ifeachor E
Proceedings of the ISSA 2004 Enabling Tomorrow Conference, South Africa, 30 June-2 July, 2004
More details

Automating the process of intrusion response
Papadaki M, Furnell SM
Proceedings of the 5th Australian Information Warfare Security Conference, Perth, Australia, 25-26 November, CDROM, pp32-41, 2004
More details

Approaches to IT Security in Small and Medium Enterprises
Dimopoulos V, Furnell SM, Jennex M, Kritharas I
Proceedings of the 2nd Australian Information Security Management Conference 2004, Perth, Australia, 26 November 2004, CD-ROM, pp73-82, 2004
More details | Download PDF

Attacks against Mobile Ad Hoc Networks Routing Protocols
Razak SA, Furnell SM, Brooke PJ
Proceedings of 5th Annual Postgraduate Symposium on The Convergence of Telecommunications, Networking & Broadcasting, PGNET 2004, Liverpool, UK, 28-29 June, pp147-152, 2004
More details

A Framework For Role-Based Monitoring of Insider Misuse
Phyo AH, Furnell SM, Portilla F
Proceedings of IFIP/SEC 2004 - 18th International Conference on Information Security, Toulouse, France, 23-26 August, pp51-65, 2004
More details

A Long-term Trial of Keystroke Profiling using Digraph, Trigraph and Keyword Latencies
Dowland PS, Furnell SM
Proceedings of IFIP/SEC 2004 - 19th International Conference on Information Security, Toulouse, France, 23-26 August, pp275-289, 2004
More details

Optimising Video Layers to the Available Bandwidth Based for Packet Networks
Thakur A, Lines BL, Reynolds PL, Knahl MH, Furnell SM
Proceedings of the Fourth International Network Conference (INC 2004), Plymouth, UK, 6-9 July 2004, CD-ROM, 2004
More details | Download PDF

Multi-Dimensional-Personalisation for the online and offline world
Schilke SW, Bleimann U, Furnell SM, Phippen AD
Proceedings of the Fourth International Network Conference (INC 2004), Plymouth, UK, 6-9 July 2004, pp545-552, 2004
More details | Download PDF

Architectural specifications and design for an automated vulnerability resolver
Alayed A, Furnell SM, Zhao D, Barlow I, Tomlinson M
Proceedings of the Fourth International Network Conference (INC 2004), Plymouth, UK, 6-9 July 2004, pp303-310, 2004
More details | Download PDF

A Correlation Framework for Continuous User Authentication Using Data Mining
Singh H, Furnell SM, Dowland PS, Lines BL, Kaur S
Proceedings of the Fourth International Network Conference (INC 2004), Plymouth, UK, 6-9 July 2004, pp237-245, 2004
More details | Download PDF

Factors affecting the adoption of IT risk analysis
Dimopoulos V, Furnell SM, Barlow I, Lines BL
The 3rd European Conference on Information Warfare and Security Royal Holloway, University of London, UK, 28-29 June, 2004
More details | Download PDF

The Adoption of Criminal Profiling for Computer Crime
Preuss J, Furnell SM, Lea S
EICAR 2004 Conference CD-rom: Best Paper Proceedings, 2004
More details | Download PDF

Using protection profiles to simplify risk management
Dimopoulos V, Furnell SM, Barlow I, Lines BL
The Security Conference, April 14/15, Las Vegas, USA, 2004
More details | Download PDF

Patient Consent Advisory System
Karweni T, Furnell SM, Gaunt PN
Proceedings of Euromedia 2004, Hasselt, Belgium, 21-23 April, pp133-137, 2004
More details

A Conceptual Framework for Monitoring Insider Misuse
Phyo AH, Furnell SM
Proceedings of Euromedia 2004, Hasselt, Belgium, 21-23 April, pp90-95, 2004
More details

Application of Keystroke Analysis to Mobile Text Messaging
Clarke NL, Furnell SM, Lines BL, Reynolds PL
Proceedings of the 3rd Security Conference, Las Vegas, USA, 14-15 April, 2004
More details | Download PDF

A Detection-Oriented Classification of Insider IT Misuse
Phyo AH, Furnell SM
Proceedings of the 3rd Security Conference, Las Vegas, USA, 14-15 April, 2004
More details

Operational Characteristics of an Automated Intrusion Response System
Papadaki M, Furnell SM, Lines BL, Reynolds PL
Communications and Multmedia Security: Advanced Techniques for Network and Data Protection, pp65-75, 2003
More details

Considering IT Risk Analysis in Small and Medium Enterprises
Dimopoulos V, Furnell SM, Barlow I
Proceedings of the 1st Australian Information Security Management Conference 2003 (InfoSec03), Perth, Australia, 24 November, 2003
More details | Download PDF

Interpolation of Packet Loss and Lip Sync Error on IP Media
Mued L, Lines BL, Furnell SM
Proceedings Volume V, International Conference on Computer, Communication and Control Technologies (CCCT?03), Orlando, USA, 31 July - 2 August, 2003
More details | Download PDF

Cybercrime: Vandalizing the Information Society
Furnell SM
Proceedings of the International Conference on Web Engineering, ICWE 2003, Oviedo, Spain, 14-18 July, pp8-16, 2003
More details

The Effects of Lip Synchronization in IP Conferencing
Mued L, Lines BL, Furnell SM, Reynolds PL
Proceedings of the International Conference on Visual Information Engineering ? VIE 2003, University of Surrey, UK, 7-9 July, 2003
More details | Download PDF

Data Gathering for Insider Misuse Monitoring
Phyo AH, Furnell SM
Proceedings of the 2nd European Conference on Information Warfare and Security, Reading, UK, 30 June - 1 July, pp247-254, 2003
More details | Download PDF

Improving Security Awareness And Training Through Computer-Based Training
Furnell SM, Warren A, Dowland PS
Proceedings of the WISE Conference, Monterey, USA, July, pp287-301, 2003
More details | Download PDF

Using Keystroke Analysis as a mechanism for Subscriber Authentication on Mobile Handsets
Clarke NL, Furnell SM, Lines BL, Reynolds PL
Proceedings of the IFIP SEC 2003 Conference, Athens, Greece, May, pp97-108, 2003
More details | Download PDF

Assessing IT Security Culture: System Administrator and End-User
Finch J, Furnell SM, Dowland PS
Proceedings of ISOneWorld Conference 2003, Las Vegas, USA, April 23-25, CD Only, 2003
More details | Download PDF

Evaluating the reliability of commercially available biometric devices
Dimopoulos V, Fletcher J, Furnell SM
Proceedings of Euromedia 2003, Plymouth, England, 14-16 April, pp166-174, 2003
More details | Download PDF

Biometric Authentication for Mobile Devices
Clarke NL, Furnell SM, Reynolds PL
Proceedings of the 3rd Australian Information Warfare and Security Conference, Perth, Western Australia, 28-29 November 2002, pp61-69, 2002
More details | Download PDF

Watching your own: The problem of insider IT misuse
Furnell SM, Phyo AH
Proceedings of AiCE 2002 ? Third Australian Institute of Computer Ethics Conference, Sydney, Australia, 30 September 2002, pp17-24, 2002
More details | Download PDF

Endpoint study of Internet paths and web pages transfers
Ghita BV, Furnell SM, Lines BL, Ifeachor E
Proceedings of the Third International Network Conference (INC 2002), Plymouth, UK, 16-18 July 2002, pp261-270, 2002
More details | Download PDF

Investigating Interaction of Audio and Video Quality as Perceived in Low-Cost Multimedia Conferencing Systems
Mued L, Lines BL, Furnell SM, Reynolds PL
Proceedings of the Third International Network Conference (INC 2002), Plymouth, UK, 16-18 July 2002, pp181-189, 2002
More details | Download PDF

WebRUM: A Model for Measuring Web-Wide Resource Usage
Evans MP, Furnell SM
Proceedings of the Third International Network Conference (INC 2002), Plymouth, UK, 16-18 July 2002, pp11-21, 2002
More details | Download PDF

Critical awareness ? The problem of monitoring security vulnerabilities
Furnell SM, Alayed A, Barlow I, Dowland PS
Proceedings of European Conference on Information Warfare and Security, 8-9 July 2002, Brunel, UK, pp85-92, 2002
More details | Download PDF

Subscriber Authentication for Mobile Phones through the Implementation of Keystroke Dynamics
Clarke NL, Furnell SM, Lines BL, Reynolds PL
Proceedings of the Third International Network Conference (INC 2002), Plymouth, UK, 16-18 July, pp347-355, 2002
More details | Download PDF

Advanced Subscriber Authentication Approaches For Third Generation Mobile Systems
Clarke NL, Furnell SM, Reynolds PL, Rodwell PM
Proceedings of the Third International Conference on 3G Mobile Communication Technologies, London, UK, 8-10 May, 2002
More details | Download PDF

A Web-Based Resource Migration Protocol Using WebDAV
Evans MP, Furnell SM
Proceedings of WWW 2002 - The Eleventh InternationalWorld Wide Web Conference, Honolulu, Hawaii, USA, 7-11 May, pp263-271, 2002
More details | External link available

Addressing Internet security vulnerabilities - A benchmarking study
Alayed A, Furnell SM, Barlow I
Proceedings of IFIP/SEC 2002 - 17th International Conference on Information Security, Cairo, Egypt, 7-9 May, pp121-132, 2002
More details

Keystroke Analysis as a Method of Advanced User Authentication and Response
Dowland PS, Furnell SM, Papadaki M
Proceedings of IFIP/SEC 2002 - 17th International Conference on Information Security, Cairo, Egypt, 7-9 May, pp215-226, 2002
More details

An Integrated Network and System Management Framework based on Adapted Software Components
Knahl MH, Bleimann U, Furnell SM, Hofmann HD
Proceedings of Euromedia 2002, Modena, Italy, 15-17 April, pp113-118, 2002
More details | Download PDF

A Response-Oriented Taxonomy of IT System Intrusions
Papadaki M, Furnell SM, Lines BL, Reynolds PL
Proceedings of Euromedia 2002, Modena, Italy, 15-17 April, pp87-95, 2002
More details | Download PDF

The problem of categorising cybercrime and cybercriminals
Furnell SM
Proceedings of the 2nd Australian Information Warfare and Security Conference, Perth, Western Australia, 29-30 November, 2001
More details | Download PDF

Security Vulnerabilities and System Intrusions ? The need for Automatic Response Frameworks
Papadaki M, Magklaras GB, Furnell SM, Alayed A
Proceedings of the IFIP 8th Annual Working Conference on Information Security Management & Small Systems Security, Las Vegas, 27-28 September, 2001
More details | Download PDF

A Preliminary Investigation of User Authentication Using Continuous Keystroke Analysis
Dowland PS, Singh H, Furnell SM
Proceedings of the IFIP 8th Annual Working Conference on Information Security Management & Small Systems Security, Las Vegas, 27-28 September, 2001
More details | Download PDF

Performance Evaluation of Desktop Videoconferencing
Mued L, Lines BL, Furnell SM, Reynolds PL
Proceedings of PG Net 2001 ? 2nd Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting, Liverpool, UK, pp13-17, 18-19 June, 2001
More details | Download PDF

Non-intrusive IP Network Performance Monitoring for TCP Flows
Ghita BV, Lines BL, Furnell SM, Ifeachor E
Proceedings of IEEE ICT2001, Bucharest, Romania, pp290-295, 4-7 June, 2001
More details | Download PDF

Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining
Singh H, Furnell SM, Lines BL, Dowland PS
Proceedings of International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security, St. Petersburg, Russia, 21-23 May, 2001
More details | Download PDF

A Conceptual Security Framework to support Continuous Subscriber Authentication in Third Generation Mobile Networks
Rodwell PM, Furnell SM, Reynolds PL
Proceedings of Euromedia 2001, Valencia, Spain, 18-20 April, 2001
More details | Download PDF

Practitioner Perception of Component Based Software Development
Phippen AD, Furnell SM, Hofmann HD
Proceedings of Euromedia 2001, Valencia, Spain, 18-20 April, 2001
More details | Download PDF

CORBA middleware services - Are they secure?
Joyce EM, Furnell SM, Reynolds PL, Sanders P
Proceedings of Euromedia 2001, Valencia, Spain, 18-20 April, 2001
More details | Download PDF

A Generic Taxonomy for Intrusion Specification and Response
Furnell SM, Magklaras GB, Papadaki M, Dowland PS
Proceedings of Euromedia 2001, Valencia, Spain, 18-20 April, 2001
More details | Download PDF

Promoting security awareness and training within small organisations
Furnell SM, Gennatou M, Dowland PS
Proceedings of the First Australian Information Security Management (AISM) Workshop, Geelong, Australia, 7 November, 2000
More details | Download PDF

An Integrated Management Architecture for Heterogeneous Networks: INSMware
Knahl MH, Bleimann U, Hofmann HD, Furnell SM
Proceedings of the IEEE Workshop on IP-oriented Operations and Management (IPOM '2000), Cracow, Poland, 4-6 September, 2000
More details | Download PDF

A conceptual intrusion monitoring architecture and thoughts on practical implementation
Dowland PS, Furnell SM
Proceedings of the World Computer Congress 2000, 21-25 August, 2000
More details | Download PDF

Management of Service Level Agreements using INSMware
Knahl MH, Furnell SM
Proceedings of the Second International Network Conference (INC 2000), Plymouth, UK, pp229-238, 3-6 July, 2000
More details | Download PDF

User authentication for keypad-based devices using keystroke analysis
Ord T, Furnell SM
Proceedings of the Second International Network Conference (INC 2000), Plymouth, UK, pp263-272, 3-6 July, 2000
More details | Download PDF

Enhancing Operating System Authentication Techniques
Dowland PS, Furnell SM
Proceedings of the Second International Network Conference (INC 2000), Plymouth, UK, pp253-261, 3-6 July, 2000
More details | Download PDF

IP Networks Performance Monitoring of Voice Flows for IP Telephony
Ghita BV, Furnell SM, Lines BL, Le Foll D, Ifeachor E
Proceedings of the Second International Network Conference (INC 2000), Plymouth, UK, pp145-155, 3-6 July, 2000
More details | Download PDF

Measurement of IP Transport Parameters for IP Telephony
Ghita BV, Furnell SM, Lines BL, Ifeachor E
Proceedings of PG Net 2000 ? 1st Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting, Liverpool, UK, pp31-36, 19-20 June, 2000
More details | Download PDF

Non-intrusive security requirements for third generation mobile systems
Rodwell PM, Furnell SM, Reynolds PL
Proceedings of PG Net 2000 ? 1st Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting, Liverpool, UK, pp7-12, 19-20 June, 2000
More details | Download PDF

Developing tools to support online distance learning
Furnell SM, Evans MP, Dowland PS
Proceedings of EUROMEDIA 2000, Antwerp, Belgium, 8-10 May, 2000
More details | Download PDF

Cyber Terrorism: The Political Evolution of the Computer Hacker
Warren MJ, Furnell SM
Proceedings of Australian Institute of Computer Ethics Conference 1999 (AICEC99), Melbourne, Australia, pp415-425, 14-16 July, 1999
NB paper has been scanned from printed copy. We apologise for the screen quality of this paper.
More details | Download PDF

A Hyper Graphics Markup Language for optimising WWW access in wireless networks
Reynolds PL, Furnell SM, Evans MP, Phippen AD
Proceedings of Euromedia 99, Munich, Germany, pp136-144, 25-28 April, 1999
More details

Security considerations in online distance learning
Furnell SM, Bleimann U, Girsang J, Röder HF, Sanders P, Stengel I
Proceedings of Euromedia 99, Munich, Germany, pp31-135, 25-28 April, 1999
More details | Download PDF

Methods of responding to healthcare security incidents
Furnell SM, Gritzalis D, Katsikas SK, Mavroudakis K, Sanders P, Warren MJ
Proceedings of MEDINFO 98, Seoul, South Korea, 18-22 August, 1998
More details | Download PDF

Integration of ATM Management Procedures into Native Integrated Network and System Management Architectures
Knahl MH, Bleimann U, Furnell SM, Sanders P
Proceedings of the first International Network Conference 1998 (INC 98), Plymouth, UK, pp91-97, 6-9 July, 1998
More details | Download PDF

Content Migration on the World Wide Web
Evans MP, Phippen AD, Müller G, Furnell SM, Sanders P, Reynolds PL
Proceedings of the first International Network Conference 1998 (INC 98), Plymouth, UK, pp156-161, 6-9 July, 1998
More details | Download PDF

Electronic Commerce : Winners and Losers
Warren MJ, Furnell SM
Proceedings of the first International Network Conference 1998 (INC 98), Plymouth, UK, pp197-202, 6-9 July, 1998
More details | Download PDF

Mobility Considerations for integrated Telecommunications Service Environments
Evans MP, Furnell SM, Phippen AD, Reynolds PL
Proceedings of IEE Sixth International Conference on Telecommunications, Edinburgh, UK, 29 March-1 April, 1998
More details | Download PDF

A Software Platform for the Integration of a Mobile Client to Intranet Services
Phippen AD, Hindle C, Furnell SM, Sanders P
Proceedings of Euromedia 98, Leicester, UK, pp177-183, 5-7 January, 1998
More details | Download PDF

Using CORBA to Support Terminal Mobility
Liljeberg M, Evans MP, Furnell SM, Maumon N, Raatikainen K, Veldkamp E, Wind BCF, Trigila S
Proceedings of TINA 97 Conference, Santiago, Chile, 17-21 November, 1997
More details | Download PDF

Internet information browsing using GSM data communications : A benchmarking study
Liljeberg M, Furnell SM, Raatikainen K, Furnell SM, Liljeberg M, Furnell SM, Raatikainen K, Furnell SM
Proceedings of ACTS Mobile Communication Summit 97, Aalborg, Denmark, vol 2, pp876-881, ISBN Number 87-985750-5-8, 7-10 October, 1997
More details

A comprehensive authentication and supervision architecture for networked multimedia systems
Furnell SM, Illingworth HM, Katsikas SK, Reynolds PL, Sanders P
Proceedings of IFIP CMS 97, Athens, Greece, pp227-238, 22-23 September, 1997
More details | Download PDF

Resource Adaptation in the TINA Service Environment
Evans MP, Phippen AD, Furnell SM, Reynolds PL
Proceedings of Fourth Communications Networks Symposium, Manchester, UK, 7-8 July, 1997
More details

Addressing information security training and awareness within the European healthcare community
Furnell SM, Sanders P, Warren MJ
Proceedings of Medical Informatics Europe 14th International Congress (MIE 97), Porto Carras, Greece, pp707-711, 25-29 May, 1997
More details | Download PDF

Addressing the problem of data security in healthcare information systems
Furnell SM, Sanders P, Warren MJ
Proceedings of HC97: Current Perspectives in Healthcare Computing 1997 Part 1, Harrogate, UK, pp55-62, 17-19 March, 1997
NB paper has been scanned from printed copy. We apologise for the screen quality of this paper.
More details | Download PDF

A Telematics Security Training Application
Furnell SM, Hill D, Rosewall I, Warren MJ
Proceedings of EUROMEDIA 96, London, UK, pp286-290, 19-21 December, 1996
More details | Download PDF

Addressing security in an Integrated Service Engineering environment
Joyce EM, Furnell SM, Reynolds PL, Sanders P
Proceedings of EUROMEDIA 96, London, UK, pp172-179, 19-21 December, 1996
More details

Non-Intrusive Security Arrangements to support Terminal and Personal Mobility
Furnell SM, Green M, Hope S, Morrissey JP, Reynolds PL
Proceedings of EUROMEDIA 96, London, UK, pp167-171, 19-21 December, 1996
More details | Download PDF

POSEIDON - A Composite Multimedia Hospital Patient Records System
Salmons NJ, Furnell SM, Sanders P, Stockel CT, Warren MJ
Proceedings of Toward An Electronic Health Record Europe ?96, London, UK, 14-17 November, 1996
More details | Download PDF

Approaches to security in healthcare multimedia systems
Furnell SM, Salmons NJ, Sanders P, Stockel CT, Warren MJ
Proceedings of IFIP TC-6 and TC-11 Joint working Conference on Communications and Multimedia Security, Essen, Germany, pp25-35, 23-24 September, 1996
More details

ODESSA - Intelligent Healthcare Security Risk Assessment
Warren MJ, Furnell SM, Sanders P
Proceedings of 2nd International Conference on Neural Networks and Expert Systems in Medicine and Healthcare (NNESMED 96), Plymouth, UK, 28-30 August, 1996
This paper is not currently available. Please refer to paper number 33 - "ODESSA - A New Approach to Healthcare Risk Analysis"
More details

Provision of healthcare security information services using the World-Wide Web
Furnell SM, Sanders P, Warren MJ
Proceedings of Medical Informatics Europe 13th International Congress (MIE 96), Copenhagen, Denmark, 19-22 August, 1996
More details

Applications of keystroke analysis for improved login security and continuous user authentication
Furnell SM, Morrissey JP, Sanders P, Stockel CT
Proceedings of 12th International Conference on Information Security (IFIP SEC ?96), Island of Samos, Greece, 21-24 May, 1996
NB paper has been scanned from printed copy. We apologise for the screen quality of this paper.
More details | Download PDF

The SEISMED Guidelines for Host Systems Secuirty
Furnell SM, Sanders P
Towards Security in Medical Telematics: Legal and Technical Aspects, B.Barber et al. (Eds), IOS Press, pp150-155, 1996
More details

Simulation of a multimedia patient records system
Salmons NJ, Furnell SM, Sanders P, Stockel CT
Proceedings of SCSC ?95 - 1995 Summer Computer Simulation Conference, Ottawa, Canada, 24-26 July, 1995
More details | Download PDF

The use of Simulation in Computer-based Security Systems
Furnell SM, Sanders P, Stockel CT
Proceedings of SCSC ?95 - 1995 Summer Computer Simulation Conference, Ottawa, Canada, 24-26 July, 1995
NB paper has been scanned from printed copy. We apologise for the screen quality of this paper.
More details | Download PDF

Security Management in the Healthcare Environment
Furnell SM, Sanders P
Proceedings of MEDINFO ?95 - 8th World Congress on Medical Informatics, Vancouver, Canada, pp675-578, 23-27 July, 1995
NB paper has been scanned from printed copy. We apologise for the screen quality of this paper.
More details | Download PDF

Secure Multimedia Systems in Healthcare and Medicine
Furnell SM, Salmons NJ, Sanders P, Stockel CT, Warren MJ
Proceedings of MEDIACOMM 95 - International Conference on Multimedia Communications, Southampton, UK, pp103-107, 11-12 April, 1995
NB paper has been scanned from printed copy. We apologise for the screen quality of this paper.
More details | Download PDF

The use of Keystroke Analysis for Continuous User Identity Verification and Supervision
Furnell SM, Sanders P, Stockel CT
Proceedings of MEDIACOMM 95 - International Conference on Multimedia Communications, Southampton, UK, pp189-193, 11-12 April, 1995
NB paper has been scanned from printed copy. We apologise for the screen quality of this paper.
More details | Download PDF

An Expert System for Health Care Data Security : A Conceptual Outline
Furnell SM, Sanders P, Stockel CT
Proceedings of NNESMED 94 - International Conference on Neural Networks & Expert Systems in Medicine and Healthcare, Plymouth, England, pp346-352, August, 1994
NB paper has been scanned from printed copy. We apologise for the screen quality of this paper.
More details | Download PDF

Data Security in Medical Information Systems using a Generic Model
Sanders P, Furnell SM
Proceedings of MIE ?93 - 11th International Congress of the European Federation for Medical Informatics, Jerusalem, Israel, pp410-414, 18-22 April, 1993
NB paper has been scanned from printed copy. We apologise for the screen quality of this paper.
More details | Download PDF

195 Conference papers

Books

E-mail Security: A Pocket Guide
Furnell SM, Dowland PS
IT Governance Publishing, ISBN: 978-1849280969, pp108, 2010
More details | External link available

Mobile Security: A Pocket Guide
Furnell SM
IT Governance Publishing, ISBN: 978-1849280204, 77pp, 2009
More details | External link available

ΚΥΒΕΡΝΟΕΓΚΛΗΜΑ (Cybercrime - Greek Edition)
Furnell SM
ΠΑΠΑΖΗΣΗΣ, ISBN: 9-600-21940-0, 397pp, 2006
More details

Computer Insecurity: Risking the System
Furnell SM
Springer, ISBN: 1-85233-943-8, 234pp, 2005
More details

Cybercrime: Vandalizing the Information Society
Furnell SM
Addison Wesley Professional, ISBN: 0-201-72159-7, 336pp, 2001
Full details here
More details

5 Books

Edited books

Trust, Privacy and Security in Digital Business - 13th International Conference, TrustBus 2016
Katsikas SK, Lambrinoudakis C, Furnell SM
Porto, Portugal, September 7-8. Lecture Notes in Computer Science 9830, Springer, ISBN 978-3-319-44340-9 123pp, 2016
More details | External link available

Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016)
Clarke NL, Furnell SM
Frankfurt, Germany, 19-21 July, ISBN: 978-1-84102-413-4, pp313, 2016
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2015)
Furnell SM, Clarke NL
Lesvos, Greece, July 1-3, ISBN: 978-1-84102-388-5, pp295, 2015
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2014)
Clarke NL, Furnell SM
Plymouth, 8-10 July, ISBN: 978-1-84102-375-5, pp239, 2014
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the Tenth International Network Conference (INC 2014)
Dowland PS, Furnell SM, Ghita BV
Plymouth, 8-10 July, ISBN: 978-1-84102-373-1, pp197, 2014
Support independent publishing: Buy this book on Lulu.
More details | External link available

Trust, Privacy and Security in Digital Business - 10th International Conference, TrustBus 2013
Furnell SM, Lambrinoudakis C, Lopez J
Prague, Czech Republic, August 28-29, Lecture Notes in Computer Science 8058, Springer, ISBN 978-3-642-40342-2. 199pp, 2013
More details | External link available

Advances in Communications, Computing, Networks and Security Volume 10
Dowland PS, Furnell SM
Plymouth University, ISBN: 978-184102-358-8, pp229, 2013
Support independent publishing: Buy this book on Lulu.
More details | Download PDF | External link available

Proceedings of the European Information Security Multi-Conference (EISMC 2013)
Furnell SM, Clarke NL, Katos V
Lisbon, Portugal, 8-10 May, ISBN: 978-1-84102-345-8, pp153, 2013
Support independent publishing: Buy this book on Lulu.
More details | External link available

Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012
Gritzalis D, Furnell SM, Theoharidou M
Heraklion, Crete, Greece, June 4-6, 2012, IFIP Advances in Information and Communication Technology, Springer, ISBN 978-3-642-30435-4. 592pp, 2012
More details | External link available

Proceedings of the Ninth International Network Conference (INC 2012)
Botha RA, Dowland PS, Furnell SM
Port Elizabeth, South Africa, 11-12 July, ISBN: 9781841023151, pp238, 2012
Support independent publishing: Buy this book on Lulu.
More details | External link available

Advances in Communications, Computing, Networks and Security Volume 9
Dowland PS, Furnell SM
Plymouth University, ISBN: 978-184102-320-5, pp217, 2012
Support independent publishing: Buy this book on Lulu.
More details | Download PDF | External link available

Proceedings of the Sixth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2012)
Clarke NL, Furnell SM
Plymouth University, ISBN: 978-1-84102-317-5, 222pp, 2012
Support independent publishing: Buy this book on Lulu.
More details | External link available

Trust, Privacy and Security in Digital Business - 8th International Conference, TrustBus 2011
Furnell SM, Lambrinoudakis C, Pernul G
Toulouse, France, August 29 - September 2. Lecture Notes in Computer Science 6863, Springer, ISBN 978-3-642-22889-6, 223pp, 2011
More details | External link available

Advances in Communications, Computing, Networks and Security Volume 8
Dowland PS, Furnell SM
Plymouth University, ISBN: 978-1-84102-293-2, pp293, 2011
Support independent publishing: Buy this book on Lulu.
More details | Download PDF | External link available

Proceedings of the Fifth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2011)
Furnell SM, Clarke NL
University of Plymouth, ISBN: 978-1-84102-284-0, 148pp, 2011
Support independent publishing: Buy this book on Lulu.
More details | External link available

Advances in Communications, Computing, Networks and Security Volume 7
Dowland PS, Furnell SM
Plymouth University, ISBN: 978-1-84102-283-3, pp285, 2010
Support independent publishing: Buy this book on Lulu.
More details | Download PDF | External link available

Proceedings of the Eighth International Network Conference (INC 2010)
Bleimann U, Dowland PS, Furnell SM, Schneider O
Heidelberg, Germany, 8-10 July, ISBN: 978-1-84102-259-8, pp413, 2010
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the South African Information Security Multi-Conference (SAISMC 2010)
Clarke NL, Furnell SM, von Solms R
University of Plymouth, ISBN: 978-1-84102-256-7, pp291, 2010
Support independent publishing: Buy this book on Lulu.
More details | External link available

Advances in Communications, Computing, Networks and Security 6
Dowland PS, Furnell SM
University of Plymouth, ISBN: 978-1-84102-258-1, pp321, 2009
Support independent publishing: Buy this book on Lulu.
More details | Download PDF | External link available

Proceedings of the Fifth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2009)
Bleimann U, Dowland PS, Furnell SM, Grout VM
University of Plymouth, ISBN: 978-1-84102-236-9, 223pp, 2009
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the Third International Symposium on Human Aspects of Information Security & Assurance (HAISA 2009)
Furnell SM, Clarke NL
University of Plymouth, ISBN: 978-1-84102-231-4, 147pp, 2009
Support independent publishing: Buy this book on Lulu.
More details

Proceedings of the 11th IFIP TC 11.1 Working Conference on Information Security Management
Dowland PS, Furnell SM
Richmond, Virginia on 16-17 October, ISBN: 978-3-901882-31-9, pp127, 2008
Support independent publishing: Buy this book on Lulu.
More details

Advances in Communications, Computing, Networks and Security 5
Dowland PS, Furnell SM
University of Plymouth, ISBN: 978-1-84102-257-4, pp323, 2008
Support independent publishing: Buy this book on Lulu.
More details | Download PDF | External link available

Trust and Engagement in ICT Mediated Services: Understanding Public Perceptions
Lacohee H, Cofta P, Phippen AD, Furnell SM
Professional Education International (PEI), Chicago, Illinois, ISBN 978-1931695954. 350pp., 2008
More details

Trust, Privacy and Security in Digital Business
Furnell SM, Katsikas SK, Lioy A
LNCS 5185, Springer, ISBN 978-3-540-85734-1. 205pp, 2008
More details | External link available

Proceedings of the Fourth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2008)
Bleimann U, Dowland PS, Furnell SM, Grout VM
University of Plymouth, ISBN: 978-1-84102-196-6, 215pp, 2008
Support independent publishing: Buy this book on Lulu.
More details

Proceedings of the Second International Symposium on Human Aspects of Information Security & Assurance (HAISA 2008)
Clarke NL, Furnell SM
University of Plymouth, ISBN: 978-1-84102-189-8, 151pp, 2008
Support independent publishing: Buy this book on Lulu.
More details

Proceedings of the 7th International Network Conference (INC 2008)
Dowland PS, Furnell SM
University of Plymouth, ISBN: 978-1-84102-188-1, 289pp, 2008
Support independent publishing: Buy this book on Lulu.
More details | External link available

Securing Information and Communications Systems: Principles, Technologies, and Applications
Furnell SM, Katsikas SK, Lopez J, Patel A
Artech House, ISBN 978-1-59693-228-9, 289pp, 2008
More details | External link available

Advances in Networks, Computing and Communications 4
Dowland PS, Furnell SM
University of Plymouth, ISBN: 978-1-84102-180-5, pp304, 2007
Support independent publishing: Buy this book on Lulu.
More details | Download PDF | External link available

Proceedings of the International Symposium on Human Aspects of Information Security & Assurance (HAISA 2007)
Furnell SM, Clarke NL
University of Plymouth, ISBN: 978-1-84102-174-4, 178pp, 2007
Support independent publishing: Buy this book on Lulu.
More details

Proceedings of the Third Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2007)
Bleimann U, Dowland PS, Furnell SM
University of Plymouth, ISBN: 978-1-8410-2173-7, 273pp, 2007
Support independent publishing: Buy this book on Lulu.
More details

Advances in Networks, Computing and Communications 3
Dowland PS, Furnell SM
University of Plymouth, ISBN: 978-1-8410-2179-9, pp277, 2006
Support independent publishing: Buy this book on Lulu.
More details | Download PDF | External link available

Trust, Privacy, and Security in Digital Business
Fischer-Hübner S, Furnell SM, Lambrinoudakis C
Proceedings of the Third International Conference on Trust, Privacy, and Security of Digital Business (TrustBus06), LNCS 4083, Springer, ISBN 0302-9743, 246pp, 2006
More details

Proceedings of the 6th International Network Conference (INC 2006)
Furnell SM, Dowland PS
University of Plymouth, ISBN 1-84102-157-1, 428pp, 2006
Support independent publishing: Buy this book on Lulu.
More details | External link available

Security Management, Integrity, and Internal Control in Information Systems
Dowland PS, Furnell SM, Thuraisingham B, Wang XS
Springer, ISBN 0-387-29826-6. 373pp, 2005
More details

Advances in Network and Communications Engineering 2
Furnell SM, Dowland PS
University of Plymouth, ISBN: 1-84102-140-7, pp191, 2005
Support independent publishing: Buy this book on Lulu.
More details | Download PDF | External link available

Proceedings of the 5th International Network Conference (INC 2005)
Furnell SM, Dowland PS, Kormentzas G
University of the Aegean & University of Plymouth, ISBN 978-1-84102-272-7, 576pp, 2005
Support independent publishing: Buy this book on Lulu.
More details | External link available

Advances in Network and Communications Engineering
Furnell SM, Filmore P
University of Plymouth, ISBN 1-84102-118-0, 185pp, 2004
Support independent publishing: Buy this book on Lulu.
More details | Download PDF | External link available

Proceedings of the 4th International Network Conference (INC 2004)
Furnell SM, Dowland PS
University of Plymouth, ISBN 1 84102 125 3, 592pp, 2004
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the 8th Annual Scientific Conference (Euromedia 2003)
Furnell SM, Dowland PS
Eurosis, ISBN 90-77301-01-5, 222pp, 2003
More details

Proceedings of the 3rd International Network Conference (INC 2002)
Furnell SM, Dowland PS
University of Plymouth, ISBN 1-84102-105-9, 638pp, 2002
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the 2nd International Network Conference (INC 2000)
Furnell SM
University of Plymouth, ISBN 1-84102-066-4, 370pp, 2000
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the 1st International Network Conference (INC 98)
Furnell SM
University of Plymouth, ISBN 1 84102 016 8, 256pp, 1998
Support independent publishing: Buy this book on Lulu.
More details | External link available

44 Edited books

Contributions to edited books

Delay-tolerant networks (DTNs) for deep-space communications
Clarke NL, Ghita BV, Furnell SM
in "Advances In Delay-Tolerant Networks (DTNs)" Edited by J Rodrigues, ISBN: 978-0-85709-840-5, Woodhead Publishing, 298p, 2014
More details | External link available

Insider Threat Specification as a Threat Mitigation Technique
Magklaras GB, Furnell SM
in "Insider Threats in Cyber Security", Probst, Christian W.; Hunker, Jeffrey; Gollmann, Dieter (Eds.), Springer, ISBN 978-1-4419-7132-6, 244pp, 2010
More details | External link available

Securing the Human Factor
Furnell SM
in "Trust and Engagement in ICT Mediated Services: Understanding Public Perceptions", H.Lacohee, P.Cofta, A.Phippen and S.Furnell (Eds), Professional Education International (PEI), Chicago, Illinois, ISBN 978-1931695954, 350pp., 2008
More details

Security usability challenges for end-users
Furnell SM
in "Social and Human Elements of Information Security: Emerging Trends and Countermeasures". M.Gupta and R.Sharman (Eds), Information Science Reference, ISBN: 978-1-60566-036-3, pp196-219, 2008
More details

User Authentication Technologies
Clarke NL, Dowland PS, Furnell SM
in Securing Information and Communications Systems: Principles, Technologies, and Applications. S.M.Furnell, S.K.Katsikas, J.Lopez and A.Patel (Eds), Artech House, ISBN 978-1-59693-228-9, pp35-59, 2008
Available on-line.
More details

Security Concepts, Services, and Threats
Dowland PS, Furnell SM
in Securing Information and Communications Systems: Principles, Technologies, and Applications. S.M.Furnell, S.K.Katsikas, J.Lopez and A.Patel (Eds), Artech House, ISBN 978-1-59693-228-9, pp5-20, 2008
Available on-line.
More details

Malware: An Evolving Threat
Furnell SM, Ward J
in Digital Crime and Forensic Science in Cyberspace. P.Kanellis, E.Kiountouzis, N.Kolokotronis and D.Martakos (Eds)., Idea Group Publishing, Hershey PA: pp28-54, 2006
More details

E-Commerce Security
Furnell SM
in Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues. M.Warkentin and R.Vaughn (Eds), Idea Group Publishing, Hershey PA: pp131-149, 2006
More details

A Model for Managing and Migrating Web Resources
Evans MP, Furnell SM
in Best Technology Practices in Higher Education. L.Lloyd (Ed), Information Today Inc., New Jersey: pp177-192, 2005
More details

Computer hacking and cyber terrorism: the real threats in the new millennium?
Furnell SM, Warren MJ
in Cyberterrorism. A.O?Day (Ed), Ashgate Publishing, 2004
More details

Online Learning and Security
Furnell SM, Karweni T
in Towards the Virtual University: International On-Line Learning Perspectives. S.English, N.Nistor and S.Wheeler (Eds), Greenwich, CT: Information Age Publishing, 2003
More details

The ISHTAR Security Guidelines
Davey J, Furnell SM, Gaunt PN
in Implementing Secure Healthcare Telematics Applications in Europe. The ISHTAR Consortium (Eds), Technology and Informatics 66, IOS Press: pp167-180, 2001
More details

The ISHTAR World Wide Web Dissemination and Advisory Service for Healthcare Information Security
Furnell SM, Warren MJ, Evans MP
in Implementing Secure Healthcare Telematics Applications in Europe. The ISHTAR Consortium (Eds), Technology and Informatics 66, IOS Press: pp249-280, 2001
More details

Baseline Security Guidelines for Health Care Management
Sanders P, Furnell SM, Warren MJ
in Data Security in Health Care - Volume 1, Management Guidelines. The SEISMED Consortium (Eds), Technology and Informatics 31, IOS Press: pp82-107, 1996
More details

Baseline Security Guidelines for Health Care IT and Security Personnel
Sanders P, Furnell SM, Warren MJ
in Data Security in Health Care - Volume 2, Technical Guidelines. The SEISMED Consortium (Eds), Technology and Informatics 32, IOS Press: pp189-234, 1996
More details

Baseline Security Guidelines for Health Care System Users
Sanders P, Furnell SM, Warren MJ
in Data Security in Health Care - Volume 3, User Guidelines. The SEISMED Consortium (Eds), Technology and Informatics 33, IOS Press: pp78-99, 1996
More details

16 Contributions to edited books

Posters

User Behaviour with Organisational Information Security Policies
Alotaibi M, Furnell SM, Clarke NL
Proceedings of The 8th Saudi Students Conference, January 31 - February 1, 2015
More details | Download PDF | External link available

A Framework of User Identification From Network Traffic
Alotibi G, Clarke NL, Furnell SM, Li F
Proceedings of The 8th Saudi Students Conference, January 31 - February 1, 2015
More details | Download PDF

A Review of Cloud Forensics issues, solutions & open problems
Alqahtany S, Clarke NL, Furnell SM
Proceedings of The 8th Saudi Students Conference, January 31 - February 1, 2015
More details | Download PDF | External link available

Using a "Chinese Wall" for Anonymous Recommendation and the Protection of Privacy
Schilke SW, Bleimann U, Furnell SM, Phippen AD
Poster presentation at Tag der Forschung, Fachhochschule Darmstadt, Germany, 25th October, 2005
More details | Download PDF

Multi-Dimensional-Personalisation
Schilke SW, Bleimann U, Furnell SM, Phippen AD
Poster presentation at Tag der Forschung, Fachhochschule Darmstadt, Germany, 19th October, 2004
More details | Download PDF

Enhancing Intrusion Response in Networked System
Papadaki M, Furnell SM, Dowland PS, Lines BL, Reynolds PL
Poster presentation at Britain's Younger Engineers in 2002, House of Commons, London, 9 December, 2002
More details | Download PDF

Non-Intrusive Biometric Authentication for Mobile Devices
Clarke NL, Furnell SM, Reynolds PL, Rodwell PM
Poster presentation at Biometrics 2002, Excel Center, London, UK, 6-8 November, 2002
Recipient of Best Student Prize
More details | Download PDF

Non-Intrusive Subscriber Authentication for 3G Mopbile System
Clarke NL, Dowland PS, Furnell SM, Reynolds PL, Rodwell PM
Poster presentation at Britain's Younger Engineers in 2001, House of Commons, London, 3 December, 2001
More details | Download PDF

Advanced Authentication and Intrusion Detection Technologies
Dowland PS, Furnell SM, Magklaras GB, Papadaki M, Reynolds PL, Rodwell PM, Singh H
Poster presentation at Britain's Younger Engineers in 2000, House of Commons, London, 4 December, 2000
More details | Download PDF

9 Posters

Internal publications

Assessing the Feasibility of Security Metrics
Heinzle B, Furnell SM
Advances in Communications, Computing, Networks and Security Volume 10, ISBN: 978-1-84102-358-8, pp88-95, 2013
Can be ordered on-line.
More details | Download PDF

Factors Affecting Information Security Behaviour
Rajendran A, Furnell SM, Gabriel T
Advances in Communications, Computing, Networks and Security Volume 9, ISBN: 978-1-84102-320-5, pp42-49, 2012
Can be ordered on-line.
More details | Download PDF

Improving the Usability of Security Features within Tools and Applications
Heeren C, Furnell SM
Advances in Communications, Computing, Networks and Security Volume 8, ISBN: 978-1-84102-293-2, pp137-145, 2011
Can be ordered on-line.
More details | Download PDF

Security Culture in the Context of National Culture
Thomas J, Furnell SM
Advances in Communications, Computing, Networks and Security Volume 8, ISBN: 978-1-84102-293-2, pp106-116, 2011
Can be ordered on-line.
More details | Download PDF

Improving the Usability of Security Features in Tools and Applications
Rangarajan B, Furnell SM
Advances in Communications, Computing, Networks and Security Volume 8, ISBN: 978-1-84102-293-2, pp97-105, 2011
Can be ordered on-line.
More details | Download PDF

Personality Type – A Valid Indicator of Security Champions?
Gabriel T, Furnell SM, Thomson KL
Advances in Communications, Computing, Networks and Security Volume 8, ISBN: 978-1-84102-293-2, pp68-75, 2011
Can be ordered on-line.
More details | Download PDF

Attack Vectors to Wireless ZigBee Network Communications - Analysis and Countermeasures
Markert J, Massoth M, Fischer KP, Furnell SM, Bolan C
Proceedings of the Seventh Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2011), Furtwangen, Germany, ISBN: 978-1-84102-295-6, pp57-66, 2011
Can be ordered on-line.
More details | Download PDF | External link available

Implementing CSR-related KPIs into Business Intelligence Landscapes
Alxneit T, Knahl MH, Frey-Luxemburger M, Furnell SM
Proceedings of the Seventh Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2011), Furtwangen, Germany, ISBN: 978-1-84102-295-6, pp1-11, 2011
Can be ordered on-line.
More details | Download PDF | External link available

Comparing Anti-Spyware Products
Martins W, Furnell SM
Advances in Communications, Computing, Networks and Security Volume 7, ISBN: 978-1-84102-283-3, pp167-174, 2010
Can be ordered on-line.
More details | Download PDF

Improving User Awareness of Social Engineering
Newbould M, Furnell SM
Advances in Communications, Computing, Networks and Security Volume 7, ISBN: 978-1-84102-283-3, pp159-166, 2010
Can be ordered on-line.
More details | Download PDF

Online Security: Strategies for Promoting Home User Awareness
Varghese B, Furnell SM
Advances in Communications, Computing, Networks and Security Volume 7, ISBN: 978-1-84102-283-3, pp124-131, 2010
Can be ordered on-line.
More details | Download PDF

Accessing Spyware Awareness and Defences amongst Security Administrators
Koliarou M, Furnell SM
Advances in Communications, Computing, Networks and Security Volume 7, ISBN: 978-1-84102-283-3, pp53-58, 2010
Can be ordered on-line.
More details | Download PDF

Internet User’s Awareness and Understanding of Spyware and Anti-Spyware
Alshamrani M, Furnell SM
Advances in Communications, Computing, Networks and Security Volume 7, ISBN: 978-1-84102-283-3, pp20-28, 2010
Can be ordered on-line.
More details | Download PDF

Agile Limitations and Model-Driven Opportunities for Software Development Projects
Mairon K, Buchheit M, Knahl MH, Atkinson S, Furnell SM, Schreier U
Proceedings of the Sixth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2010), Plymouth, UK, ISBN: 978-1-84102-269-7, pp43-51, 2010
Can be ordered on-line.
More details | Download PDF

Towards a Classification of Information Technology Governance Frameworks
Krey M, Harriehausen-Mühlbauer B, Knoll M, Furnell SM
Proceedings of the Sixth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2010), Plymouth, UK, ISBN: 978-1-84102-269-7, pp31-41, 2010
Can be ordered on-line.
More details | Download PDF

Evaluating the Effects of Security Usability Improvements in Word 2007
Helala M, Furnell SM
Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp277-284, 2009
Can be ordered on-line.
More details | Download PDF

An Assessment of Security Advisory Website
Thomas J, Furnell SM
Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp152-159, 2009
Can be ordered on-line.
More details | Download PDF

Internet Security: A View from ISPs and Retailers
Shams R, Furnell SM
Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp135-143, 2009
Can be ordered on-line.
More details | Download PDF

Assessing the Usability of Security Features in Tools and Applications
Moustafa F, Furnell SM
Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp98-106, 2009
Can be ordered on-line.
More details | Download PDF

Improving the Usability of Security Features - a Survey of End Users
Adjei MO, Furnell SM
Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp3-11, 2009
Can be ordered on-line.
More details | Download PDF

Online Gaming: An Emerging Avenue for Exploitation?
Sanders B, Dowland PS, Furnell SM
Proceedings of the Fifth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2009), Darmstadt, Germany, ISBN: 978-1-84102-236-9, pp29-42, 2009
Can be ordered on-line.
More details | Download PDF

Response Mechanisms for Intrusion Response Systems (IRSs)
Anuar NB, Furnell SM, Papadaki M, Clarke NL
Proceedings of the Fifth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2009), Darmstadt, Germany, ISBN: 978-1-84102-236-9, pp3-14, 2009
Can be ordered on-line.
More details | Download PDF

Assessing Protection and Security Awareness amongst Home Users
Tsaganidi V-G, Furnell SM
Advances in Communications, Computing, Networks and Security 5, ISBN: 978-1-84102-257-4, pp303-312, 2008
Can be ordered on-line.
More details | Download PDF

Analysing the Extent that Children are Made Aware of Internet Security Issues Within UK Schools
Richardson BA, Furnell SM
Advances in Communications, Computing, Networks and Security 5, ISBN: 978-1-84102-257-4, pp293-302, 2008
Can be ordered on-line.
More details | Download PDF

Evolution of Wi-Fi and Security Issues
Zaman A, Furnell SM
Advances in Communications, Computing, Networks and Security 5, ISBN: 978-1-84102-257-4, pp210-217, 2008
Can be ordered on-line.
More details | Download PDF

Cyber Terrorism – Electronic Activism and the Potential Threat to the United Kingdom
Wareham A, Furnell SM
Advances in Communications, Computing, Networks and Security 5, ISBN: 978-1-84102-257-4, pp172-180, 2008
Can be ordered on-line.
More details | Download PDF

Online Security: Strategies for Promoting User Awareness
Vikharuddin M, Furnell SM
Advances in Communications, Computing, Networks and Security 5, ISBN: 978-1-84102-257-4, pp162-171, 2008
Can be ordered on-line.
More details | Download PDF

Multi Dimensional Personalisation Architecture Proposal for a Prototype
Schilke SW, Bleimann U, Furnell SM, Phippen AD
Proceedings of the Fourth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2008), Wrexham, UK, ISBN: 978-1-84102-196-6, pp121-133, 2008
Can be ordered on-line.
More details | Download PDF

A Survey of User Opinions and Preference Towards Graphical Authentication
Jali MZ, Furnell SM, Dowland PS, Reid F
Proceedings of the Fourth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2008), Wrexham, UK, ISBN: 978-1-84102-196-6, pp11-20, 2008
Can be ordered on-line.
More details | Download PDF

Strengthening the Human Firewall
Tjhai GC, Furnell SM
Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp222-230, 2007
Can be ordered on-line.
More details | Download PDF

User security awareness of social engineering and phishing
Karakasiliotis A, Furnell SM, Papadaki M
Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp191-198, 2007
Can be ordered on-line.
More details | Download PDF

Improving protection and security awareness amongst home users
Bryant P, Furnell SM, Phippen AD
Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp182-190, 2007
Can be ordered on-line.
More details | Download PDF

Security Technologies: Why are they not used correctly?
Al-Tawqi M, Furnell SM
Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp164-172, 2007
Can be ordered on-line.
More details | Download PDF

Public awareness of biometrics
Evangelatos K, Furnell SM
Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp51-59, 2007
Can be ordered on-line.
More details | Download PDF

User Awareness of Biometrics
Edmonds BJ, Furnell SM
Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp30-37, 2007
Can be ordered on-line.
More details | Download PDF

Recording end-users security events: A step towards increasing usability
Chatziapostolou D, Furnell SM
Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp11-18, 2007
Can be ordered on-line.
More details | Download PDF

New architecture for a centralized next generation profile register in future mobile telecommunication networks
Diehl A, Fuhrmann W, Bleimann U, Reynolds PL, Furnell SM
Proceedings of the Third Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2007), Plymouth, UK, ISBN: 978-1-8410-2173-7, pp215-229, 2007
Can be ordered on-line.
More details | Download PDF

Security-relevance of semantic patterns in cross-organisational business processes using WS-BPEL
Fischer KP, Bleimann U, Fuhrmann W, Furnell SM
Proceedings of the Third Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2007), Plymouth, UK, ISBN: 978-1-8410-2173-7, pp67-80, 2007
Can be ordered on-line.
More details | Download PDF

Prerequisites for monitoring insider IT misuse
Phyo AH, Furnell SM, Phippen AD
Proceedings of the Third Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2007), Plymouth, UK, ISBN: 978-1-8410-2173-7, pp41-52, 2007
Can be ordered on-line.
More details | Download PDF

Device versus network-centric authentication models for mobile devices – operational and perceptual trade-offs
Karatzouni S, Clarke NL, Furnell SM
Proceedings of the Third Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2007), Plymouth, UK, ISBN: 978-1-8410-2173-7, pp23-39, 2007
Can be ordered on-line.
More details | Download PDF

Multi-dimensional-personalisation - in “whom” we trust? Perception of trust & privacy
Schilke SW, Bleimann U, Furnell SM, Phippen AD
Proceedings of the Third Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2007), Plymouth, UK, ISBN: 978-1-8410-2173-7, pp11-22, 2007
Can be ordered on-line.
More details | Download PDF

Uses and dangers of peer-to-peer and instant messaging in a business environment
Quaden T, Furnell SM, Papadaki M, Pinkney G
Advances in Network & Communication Engineering 3, pp203-211, 2006
Can be ordered on-line.
More details | Download PDF

Changing Trends in Vulnerability Discovery
Tope SW, Furnell SM, Papadaki M, Pinkney G
Advances in Network & Communication Engineering 3, pp193-202, 2006
Can be ordered on-line.
More details | Download PDF

Social Engineering: A growing threat, with diverging directions
Chelleth JV, Furnell SM, Papadaki M, Pinkney G, Dowland PS
Advances in Network & Communication Engineering 3, pp179-184, 2006
Can be ordered on-line.
More details | Download PDF

Attack Pattern Analysis: Trends in Malware Variant Development
Abu-Bakar UA, Furnell SM, Papadaki M, Pinkney G
Advances in Network & Communication Engineering 3, pp90-99, 2006
Can be ordered on-line.
More details | Download PDF

Authentication based upon secret knowledge and its resilience to impostors
Zekri L, Furnell SM
Advances in Network & Communication Engineering 3, pp30-38, 2006
Can be ordered on-line.
More details | Download PDF

Security Usability: A Survey of End-Users
Jusoh A, Furnell SM, Katsabas D
Advances in Network & Communication Engineering 3, pp3-9, 2006
Can be ordered on-line.
More details | Download PDF

Survey of Wireless Access Point Security in Plymouth
Voisin M, Ghita BV, Furnell SM
Advances in Network & Communication Engineering 2, pp85-92, 2005
More details

World Wide Web Content Study Based on Anonymised Network Traces
Salama E, Ghita BV, Furnell SM
Advances in Network & Communication Engineering 2, pp74-84, 2005
More details

The Interaction Between Mobile IPv6 and Firewalls
Ghashash L, Furnell SM, Akram A, Ghita BV
Advances in Network & Communication Engineering 2, pp66-73, 2005
More details

Security Technologies for a Virtual University
Ruiz VC, Furnell SM, Phippen AD
Advances in Network & Communication Engineering 2, pp57-65, 2005
More details

ISEduT: An Educational Tool for Information Security
Sharfaei S, Furnell SM
Advances in Network & Communication Engineering 2, pp49-56, 2005
More details

Approaches to Establishing IT Security Culture
Langue C, Furnell SM, Dowland PS
Advances in Network & Communication Engineering 2, pp43-48, 2005
More details

IT Security: A Human Computer Interaction Perspective
Katsabas D, Furnell SM, Phippen AD
Advances in Network & Communication Engineering 2, pp35-42, 2005
More details | Download PDF

IT Risk Analysis for Small and Medium Enterprises
Kritharas I, Dimopoulos V, Furnell SM
Advances in Network & Communication Engineering 2, pp27-34, 2005
More details

Passimages : An Alternative Method of User Authentication
Charruau D, Furnell SM, Dowland PS
Advances in Network & Communication Engineering 2, pp3-10, 2005
More details

Assessing Global Internet Accessibility
Alharbi MA, Furnell SM, Ghita BV
Advances in Network & Communication Engineering, pp81-89, 2004
More details

EduCQ : An Educational Tool for Information Security
Larchevêque B, Furnell SM
Advances in Network & Communication Engineering, pp72-80, 2004
More details

Privacy Implications of Network Monitoring
Periasamy V, Ghita BV, Furnell SM
Advances in Network & Communication Engineering, pp63-71, 2004
More details

Analysis of insider misuse in commercial applications
Portilla F, Furnell SM, Phyo AH
Advances in Network & Communication Engineering, pp46-54, 2004
More details

A Generic Framework for the Prevention and Detection of Insider Misuse
Coussa MJ, Phyo AH, Furnell SM
Advances in Network & Communication Engineering, pp38-45, 2004
More details

Security Analysis Tools - Do They Make Any Difference?
Bolakis S, Furnell SM, Dowland PS
Advances in Network & Communication Engineering, pp29-37, 2004
More details

Artificial Impostor Profiling for Keystroke Analysis on a Mobile Handset
Lecomte J, Clarke NL, Furnell SM
Advances in Network & Communication Engineering, pp55-62, 2004
More details | Download PDF

63 Internal publications

Technical articles

Social Engineering: Exploiting the Weakest Links
Papadaki M, Furnell SM, Dodge RC
Whitepaper, European Network & Information Security Agency (ENISA), October, 2008
More details | External link available

1 Technical articles

456 publication(s) - all categories.

Editorships / Refereeing for journals

Editor-in-Chief, Information and Computer Security
Associate Editor, Computers & Security
Associate Editor, Security and Communication Networks
Associate Editor, Journal of Information Systems Security
Co-Editor, Journal of Information Warfare
Editorial Board, The Computer Journal
Editorial Advisory Board, Internet Research
Editorial Advisory Board, Campus-Wide Information Systems

Conferences organised

In progress

Co-Chair, The 15th Annual Security Conference, Las Vegas, Nevada, 29-31 March 2016.
Program Co-Chair, 2nd International Conference on Information Systems Security and Privacy (ICISSP 2016), Rome, Italy, 19-21 February 2016.

Completed
Co-organiser, International Network Conference (INC ’98), Plymouth, UK, 7-9 July 1998.
Chair, International Network Conference 2000 (INC 2000), Plymouth, UK, 3-6 July 2000.
Chair, International Network Conference 2002 (INC 2002), Plymouth, UK, 16-18 July 2002.
Chair, EUROMEDIA 2003, Plymouth, UK, 14-16 April 2003.
Co-chair, Second European Conference on Information Warfare and Security, University of Reading, United Kingdom, 30 June - 1 July 2003.
Co-chair, The 3rd Security Conference, Las Vegas, Nevada, 14-15 April 2004.
Chair, International Network Conference 2004 (INC 2004), Plymouth, UK, 6-9 July 2004.
Co-chair, The 4th Security Conference, Las Vegas, Nevada, 30-31 March 2005.
Co-chair, International Network Conference 2005 (INC 2005), Samos, Greece, 5-7 July 2005.
Co-Chair, IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference on Security Management, Integrity, and Internal Control in Information Systems, Fairfax, Virginia, 1-2 December 2005.
Co-chair, The 5th Annual Security Conference, Las Vegas, Nevada, 19-20 April 2006.
Co-chair, IFIP TC-11 WG 11.1 & WG 11.8 Joint Workshop on Security Culture, Karlstad, Sweden, 22 May 2006.
Chair, International Network Conference 2006 (INC 2006), Plymouth, UK, 11-14 July 2006.
Co-chair, 3rd International Conference on Trust, Privacy, and Security of Digital Business (TrustBus’06), Krakov, Poland, 4-8 September 2006.
Co-chair, The 6th Annual Security Conference, Las Vegas, Nevada, 11-12 April 2007.
Co-chair, IFIP TC-11 WG 11.1 & WG 11.8 Joint Workshop on Information Security, Sandton, South Africa, 15 May 2007.
Co-chair, International Symposium on Human Aspects of Information Security and Assurance (HAISA 2007), Plymouth, UK, 10 July 2007.
Co-chair, The 7th Annual Security Conference, Las Vegas, Nevada,2-3 June 2008.
Chair, 7th European Conference on Information Warfare and Security, Plymouth, United Kingdom, 30 June - 1 July 2008.
Chair, International Network Conference 2008 (INC 2008), Plymouth, UK, 8-10 July 2008.
Co-chair, Second International Symposium on Human Aspects of Information Security and Assurance (HAISA 2008), Plymouth, UK, 8-9 July 2008.
Co-chair, 5th International Conference on Trust, Privacy, and Security of Digital Business (TrustBus’08), Turin, Italy, 4-5 September 2008.
Co-chair, 11th Annual Working Conference on Information Security Management, Richmond, Virginia, 16-18 October 2008.
Co-chair, The 8th Annual Security Conference, Las Vegas, Nevada, 15-16 April 2009.
Co-chair, Third International Symposium on Human Aspects of Information Security and Assurance (HAISA 2009), Athens, Greece, 25-26 June 2009.
Co-chair, The 9th Annual Security Conference, Las Vegas, Nevada,7-8 April 2010.
Co-chair, South African Information Security Multi-Conference (SAISMC 2010), Port Elizabeth, South Africa, 17-18 May 2010.
Co-chair, Eighth International Network Conference (INC 2010), 6-8 July, Heidelberg, Germany.
Co-chair, The 10th Annual Security Conference, Las Vegas, Nevada,4-6 May 2011.
Co-chair, Fifth International Symposium on Human Aspects of Information Security and Assurance (HAISA 2011), London, UK, 7-8 July 2011.
Co-chair, 8th International Conference on Trust, Privacy & Security in Digital Business (TrustBus’11), Toulouse, France, 29 Aug – 2 Sept 2011.
Local Chair, SecureComm 2011 - 7th International ICST Conference on Security and Privacy in Communications Network, London, UK, 7-9 September 2011.
International Chair, 6th International Conference for Internet Technology and Secured Transactions (ICITST-2011), Abu Dhabi, UAE, 11-14 December 2011.
Co-chair, The 11th Annual Security Conference, Las Vegas, Nevada, 11-13 April 2012.
Programme Co-chair, 27th IFIP International Information Security and Privacy Conference (SEC 2012), Crete, Greece, 4-6 June 2012.
Co-chair, Sixth International Symposium on Human Aspects of Information Security and Assurance (HAISA 2012), Crete, UK, 6-8 June 2012.
Co-chair, Ninth International Network Conference (INC 2012), Port Elizabeth, South Africa, 11-12 July 2012.
Co-Chair, Secure South West, Plymouth, UK, 20 September 2012.
Co-Chair, Secure South West 2, Plymouth, UK, 25 March 2013.
Co-Chair, The 12th Annual Security Conference, Las Vegas, Nevada, 10-12 April 2013.
Co-Chair, European Information Security Multi-Conference (EISMC 2013), Lisbon, Portugal, May 2013.
Co-Chair, 10th International Conference on Trust, Privacy & Security in Digital Business (TrustBus’13), Prague, Czech Republic, September 2013.
Co-Chair, Secure South West 3, Plymouth, UK, 16 December 2013.
Co-Chair, The 13th Annual Security Conference, Las Vegas, Nevada, 21-23 May 2014.
Co-Chair, Eighth International Symposium on Human Aspects of Information Security and Assurance (HAISA 2014), Plymouth, UK, 8-9 July 2014.
Co-Chair, Secure South West 4, Plymouth, UK, 10 July 2014.
Co-Chair, Secure South West 5, Plymouth, UK, 2 April 2015. 
Co-Chair, The 14th Annual Security Conference, Las Vegas, Nevada, 19-21 May 2015.
General Co-Chair, 30th IFIP TC-11 International Conference on ICT Systems Security and Privacy Protection (SEC 2015), Hamburg, Germany, 26–28 May 2015.
Co-Chair, Ninth International Symposium on Human Aspects of Information Security and Assurance (HAISA 2015), Mytilene, Greece, 1-3 July 2015.

Other international conference activities

  1. Referee and Session Chairman, EUROMEDIA 98, Leicester, UK, 5-7 January 1998.
  2. Referee, Healthcare Computing 99, Harrogate, UK, 22-24 March 1999
  3. Programme Committee, EUROMEDIA 99, Munich, Germany, 25-28 April 1999.
  4. Programme Committee, 2nd International Workshop on Innovative Internet Information Systems (IIIS’99), Copenhagen, Denmark, 21-22 June 1999
  5. Referee, Healthcare Computing 2000, Harrogate, UK, 20-22 March 2000
  6. Programme Committee, EUROMEDIA 2000, Antwerp, Belgium, 8-10 May 2000
  7. Workshop Committee, 1st Australian Information Security Management Workshop, Geelong, Australia, 7 November 2000.
  8. Referee, Healthcare Computing 2001, Harrogate, UK, 19–21 March, 2001.
  9. Programme Committee, EUROMEDIA 2001, Valencia, Spain, 19-10 April 2001.
  10. Reviewer, 8th Annual Working Conference on Information Security Management & Small Systems Security, Las Vegas, USA, 27-28 September 2001.
  11. Reviewer, 2nd International Information Warfare and Security Conference, Perth, Western Australia, 29-30 November 2001.
  12. Programme Committee, EUROMEDIA 2002, Modena, Italy, 14-16 April 2002.
  13. Conference Committee, European Conference on Information Warfare and Security, Brunel University, United Kingdom, 8-9 July 2002.
  14. Session Chair, 3rd Australian Information Warfare & Security Conference 2002, Perth, Australia, 28-29 November 2002.
  15. Programme Committee, 18th IFIP International Information Security Conference (IFIP SEC 2003), Athens, Greece, 26-28 May 2003.
  16. Programme Committee, IFIP WG11.1 9th Annual Working Conference on Information Security Management, Athens, Greece, 27 May 2003.
  17. Programme Committee, Third World Conference on Information Security Education (WISE 3), Monterey California, USA, 26-28 June 2003.
  18. Reviewer, 3rd Annual Information Security South Africa (ISSA) conference, Sandton, Gauteng, 9-11 July 2003.
  19. Programme Committee, International Conference on Web Engineering (ICWE'03), Oviedo, Spain, 16-18 July 2003.
  20. Programme Committee, Seventh IFIP Communications and Multimedia Security conference (CMS 2003), Turin, Italy, 2-3 October 2003.
  21. Programme Committee, 1st Australian Computer, Network & Information Forensics Conference, Perth, Australia, 24-28 November 2003.
  22. Programme Committee, 1st Australian Information Security Management Conference, Perth, Australia, 24-28 November 2003.
  23. Programme Committee, Information & Communication Technology (ICICT'03), Cairo, Egypt, 30 November-2 December 2003.
  24. Scientific Committee, Sciences of Electronic Technologies, Information and Telecommunications (SETIT) 2004, Susa, Tunisia, 15-20 March 2004.
  25. Associate Editor, ISOneWorld Conference & Convention, Las Vegas, Nevada, 14-16 April 200
  26. Programme Committee, EUROMEDIA 2004, Hasselt, Belgium, 19-21 April 2004.
  27. Programme Committee, 1st European PKI Workshop: Research and Applications, Samos, Greece, 25-26 June 2004.
  28. Conference Executive, 3rd European Conference on Information Warfare and Security, Royal Holloway, University of London, United Kingdom, 28-29 June 2004.
  29. Programme Committee, 4th Annual Information Security South Africa (ISSA) Conference, Gauteng Region (Johannesburg), South Africa, 1 – 3 July 2004
  30. Programme Committee, 18th IFIP International Information Security Conference (IFIP SEC 2004), Toulouse, France, August 2004
  31. International Programme Committee, Trust and Privacy in Digital Business (TrustBus´04), Zaragoza, Spain, 1-5 September 2004.
  32. Reviewer, 5th Australian Information Warfare & Security Conference, Perth, Western Australia, 25-26 November 2004.
  33. Reviewer, IEEE Wireless Communications and Networking Conference (WCNC) 2005, New Orleans, USA, 13-17 March 2005.
  34. Scientific Committee, Sciences of Electronic Technologies, Information and Telecommunications (SETIT) 2004, Susa, Tunisia, 27-31 March 2005.
  35. Programme Committee, EUROMEDIA 2005, Toulouse, France, 11-13 April 2005.
  36. Programme Committee, 14th EICAR Annual Conference, St Julians, Malta, 30 April – 3 May 2005.
  37. Programme Committee, Fourth World Conference on Information Security Education (WISE 4), Moscow, Russia, 18-20 May 2005.
  38. Reviewer, Workshop on Security In Information Systems (WOSIS-2005), Miami Beach, Florida, USA, 24-25 May 2005.
  39. Programme Committee, 20th IFIP International Information Security Conference (IFIP SEC 2005), Chiba, Japan, 30 May-1 June 2005.
  40. Programme Committee, Second SIG SIDAR Conference on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA 2005), Vienna, Austria, 7–8 July 2005.
  41. Programme Committee, 5th Annual Information Security South Africa (ISSA) Conference, Gauteng Region (Johannesburg), South Africa, 29 June – 1 July 2005.
  42. Programme Committee, Second European PKI Workshop, Kent, UK, 30 June – 1 July 2005.
  43. Conference Executive, Fourth European Conference on Information Warfare and Security, Glamorgan, South Wales, 11-12 July 2005
  44. Programme Committee, TrustBus'05, Copenhagen, Denmark, 22-26 August 2005
  45. Programme Committee, International Conference on Internet Technologies and Applications (ITA 05), Wrexham, North Wales, 7-9 September 2005
  46. Programme Committee, International Conference on E-business and Telecommunication Networks, Reading, UK, 3-7 October 2005.
  47. Programme Committee, Third IASTED International Conference on Communications and Computer Networks (CCN 2005), Marina del Rey, California, USA, 24-26 October 2005.
  48. Programme Committee, 3rd Latin American Web Congress, Buenos Aires, Argentina, 31 October – 2 November 2005.
  49. Programme Committee, IASTED International Conference on Communications, Internet and Information Technology (CIIT 2005), Cambridge, USA, 31 October – November 2005.
  50. Reviewer, 6th Australian Information Warfare and Security Conference, Geelong, Victoria, Australia, 24-25 November 2005.
  51. Programme Committee, 1st European Conference on Computer Network Defence (EC2ND), Glamorgan, South Wales, 15-16 December 2005.
  52. Reviewer, 5th IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2005), Athens, Greece, 18-21 December 2005.
  53. Programme Committee, EUROMEDIA 2006, Athens, Greece, April 2006.
  54. Programme Committee, IEEE 20th International Conference on Advanced Information Networking and Applications (AINA2006), Vienna, Austria, 18-20 April 2006.
  55. Programme Committee, First International Conference on Availability, Reliability and Security (AReS) ARES 2006 - "The International Dependability Conference", Vienna, Austria, 20-22 April 2006.
  56. Programme Committee, 15th EICAR Annual Conference, Hamburg, Germany, 29 April – 2 May 2006.
  57. Programme Committee, Second IEEE International Conference DFMA 06 (Distributed framework for Multimedia Applications), Penang, 14-17 May 2006.
  58. Programme Committee, 21st IFIP International Information Security Conference (IFIP SEC 2006), Karlstad, Sweden, 22-24 May 2006
  59. Programme Committee, Fourth International Workshop on Security In Information Systems (WOSIS-2006), Paphos, Cyprus, May 2006.
  60. Conference Executive, Fifth European Conference on Information Warfare and Security, Helsinki, Finland, 1-2 June 2006.
  61. Programme Committee, Third European PKI Workshop (EuroPKI 2006), Turin, Italy, 19-20 June 2006.
  62. Programme Committee, 7th Annual IEEE Information Assurance Workshop, United States Military Academy, West Point, New York, 21-23 June 2006
  63. Programme Committee, International Symposium on Performance Evaluation and Modelling of Wireless Networks (PEMWN06), Toronto, Canada, June/July 2006.
  64. Programme Committee, Communication Systems and Applications (CSA 2006), Banff, Canada, 3-5 July 2006. 
  65. Programme Committee, 1st Conference on Advances in Computer Security and Forensics (ACSF), Liverpool, 13-14 July 2006. 
  66. Programme Committee, SECRYPT 2006, Setϊbal, Portugal, 7-10 August 2006. 
  67. Programme Committee, 9th Information Security Conference (ISC 06), Samos Island, Greece, 30 August 30 – 2 September 2006.
  68. Programme Committee, 1st International Workshop on Critical Information Infrastructures Security (CRITIS'06), Samos Island, Greece, 30 August – 2 September 2006.
  69. Programme Committee, 5th International Conference on Entertainment Computing (ICEC 2006), Cambridge, UK, 20-22 September 2006. 
  70. Programme Committee, IASTED International Conference on Communications and Computer Networks (CCN 2006), Lima, Peru, 4-6 October 2006 
  71. Programme Committee, First International Workshop on Security (IWSEC2006), Kyoto, Japan, 23-24 October 2006. 
  72. Programme Committee, 4th Latin American Web Congress (LA-Web 2006), Puebla, Mexico, 25-27 October 2006. 
  73. Technical Programme Committee, First International Workshop on Information Security (IS'06), Montpellier, France, 29 October – 3 November 2006. 
  74. Programme Committee, 8th International Symposium on System and Information Security (SSI´2006), Sao Jose dos Campos, Sao Paulo, Brazil, 8-10 November 2006.
  75. Programme Committee, Fifth IASTED International Conference on Communications, Internet and Information Technology (CIIT 2006), St Thomas, US Virgin Islands, 29 November – 1 December 2006. 
  76. Programme Committee. IADIS e-commerce 2006, Barcelona, Spain, 9-11 December 2006. 
  77. Programme Committee. 2nd European Conference on Computer Network Defence (EC2ND), Glamorgan, UK. 14-15 December 2006.
  78. Programme Committee, 2nd IEEE International Conference on Signal Image Technology & Internet Based Systems - Track II - Web-based Information Technologies and Distributed Systems, Hammamet, Tunisia, 17-21 December 2006. 
  79. Programme Committee, The Second International Conference on Availability, Reliability and Security (AReS 2007), Vienna, Austria, 10-13 April 2007.
  80. Programme Committee, First International Workshop on Spoofing, Digital Forensics and Open Source Tools (SDFOST), Vienna, Austria, 10-13 April 2007.
  81. Programme Committee, ISOneWorld 2007 Conference and Convention, Las Vegas, Nevada, USA, 11-13 April 2007.
  82. Programme Committee, EUROMEDIA 2007, April 2007, Delft, The Netherlands.
  83. Programme Committee, 2007 International Conference on New Technologies, Mobility and Security (NTMS2007), Beirut, Lebanon, 30 April- 3 May 2007.
  84. Programme Committee, 22nd IFIP International Information Security Conference (IFIP SEC 2007), Sandton, South Africa, 14-16 May 2007.
  85. Programme Committee, 16th EICAR Annual Conference, 2007.
  86. Programme Committee, 2007 Information Resources Management Association (IRMA) International Conference, Vancouver, Canada, 19-23 May 2007.
  87. Programme Committee, 2nd International Conference on Information Science and Security, Seoul, South Korea, 23-26 May 2007.
  88. Programme Committee, IASTED International Conference on Wireless and Optical Communications (WOC 2007),  Montreal, Canada, 30 May - 1 June 2007.
  89. Programme Committee, Fifth International Workshop on Security In Information Systems (WOSIS 2007), Madeira, Portugal, June 2007.
  90. Conference Executive, 6th European Conference on Information Warfare and Security, Shrivenham, UK, 2-3 July 2007.
  91. Programme Committee, Fifth IASTED International Conference on Communications, Internet, and Information Technology (CIIT 2007), Banff, Canada, 2-4 July 2007.
  92. Programme Committee, 2nd Conference on Advances in Computer Security and Forensics (ACSF), Liverpool, UK, 12-13 July 2007.
  93. Programme Committee, SECRYPT 2007, Barcelona, Spain 28-31 July 2007.
  94. Programme Committee, 2nd Annual Workshop on Digital Forensics and Incident Analysis (WDFIA 2007), Samos, Greece, 27-28 August 2007.
  95. Programme Committee, Third International Security Symposium on Information Assurance and Security (IAS07), Manchester, UK, 29-30 August 2007.
  96. Program Committee, 4th International Conference on Trust, Privacy and Security in Digital Business (TrustBus'07), Regensburg, Germany, 3-7 September 2007.
  97. Programme Committee, Second International Conference on Internet Technologies and Applications (ITA 07), Wrexham, North Wales, 4-7 September 2007.
  98. Programme Committee, IFIP 6th International Conference on Entertainment Computing (ICEC 2007), Shanghai Jiao Tong University, Shanghai, P. R. China, 20-22 September 2007.
  99. Programme Committee, Second International Workshop on Security (IWSEC 2007), Nara, Japan, October 2007.
  100. Program Committee, IASTED International Conference on Communication Systems, Networks and Applications (CSNA 2007), Beijing, China, 8-10 October 2007.
  101. Programme Committee, International Symposium on Information Security (IS'2007), Spain, 28 October - 2 November 2007.
  102. Programme Committee, Workshop on Authentication and Identification Techniques (WAIT), Oslo, Norway, 19 November 2007.
  103. Programme Committee, IADIS e-commerce 2006, Algarve, Portugal, 7-9 December 2007.
  104. Programme Committee, 4th IEEE International Workshop on Digital Rights Management Impact on Consumer Communications (DRM 2008), Las Vegas, USA, 12 January 2008.
  105. Programme Committee, Third International Conference on Availability, Reliability and Security (ARES 2008), 4-7 March 2008, Barcelona, Spain.
  106. Programme Committee, 6th International Workshop on Security in Information Systems (WOSIS 2008), Barcelona, Spain, 12-13 June 2008.
  107. Programme Committee, Fifth European PKI Workshop (EuroPKI 2008), Trondheim, Norway, 16-17 June 2008.
  108. Review Committee, Information Security South Africa 2008 (ISSA 2008), University of Johannesburg, Gauteng, South Africa, 7-9 July 2008.
  109. Programme Committee, 3rd Advances in Computer Security and Forensics (ACSF) conference, Liverpool, UK, 10-11 July 2008.
  110. Programme Committee, IADIS International Conference e-Commerce 2008, Amsterdam, Netherlands, 25-27 July 2008.
  111. Programme Committee, SECRYPT 2008, 26-29 July, Porto, Portugal.
  112. Reviewer, UK Systems Society International Conference 2008, Oxford, UK, 1-3 September 2008.
  113. Programme Committee, 23rd International Information Security Conference (SEC 2008), Milan, Italy, 8-10 September 2008.
  114. Programme Committee, 4th International Conference on Information Assurance and Security (IAS 2008), Naples, Italy, 8-10 September 2008.
  115. Programme Committee, 7th International Conference on Entertainment Computing (ICEC 2008), Pittsburgh, USA, 25-27 September 2008.
  116. Programme Committee, Annual Conference of the South African Institute of Computer Scientists and Information Technologists (SAICSIT 2008), Wilderness, Garden Route, South Africa, 6-8 October 2008.
  117. Programme Committee, 3rd Annual Workshop on Digital Forensics and Incident Analysis (WDFIA 2008), Malaga, Spain, 9 October 2008.
  118. Programme Committee, International Workshop on War & Peace Driving: Wireless Security and Public Uptake, Avignon, France, 12 October 2008.
  119. Programme Committee, 10th International Conference on Information and Communications Security (ICICS 2008), Birmingham, UK, 20-22 October 2008.
  120. Programme Committee, LA-WEB 2008 - 6th Latin American Web Congress, Vila Velha, Brazil, 28-30 October 2008.
  121. Programme Committee, Third International Workshop on Security (IWSEC 2008), Kagawa, Japan, 25-27 November 2008.
  122. Programme Committee, 5th IEEE International Workshop on Digital Rights Management Impact on Consumer Communications, Las Vegas, Nevada, 13 January 2009.
  123. Programme Committee, The Fourth International Conference on Availability, Reliability and Security (ARES 2009), Fukuoka, Japan, 16-19 March 2009.
  124. Programme Committee, EUROMEDIA 2009, Bruges, Belgium, 15-17 April 2009.
  125. Programme Committee, 7th International Workshop on Security in Information Systems (WOSIS), Milan, Italy, 6-7 May 2009.
  126. Programme Committee, 18th EICAR Annual Conference, Berlin, Germany, 11-12 May 2009.
  127. Programme Committee, 24th IFIP International Information Security Conference (SEC 2009), Pafos, Cyprus, 18-20 May 2009.
  128. Programme Committee, IFIP TC 8 International Workshop on Information Systems Security Research, Cape Town, South Africa, 29-30 May 2009.
  129. Review Panel. 8th Annual Information Security South Africa Conference (ISSA 2009), Johannesburg, South Africa, 6-8 July 2009.
  130. International Programme Committee, SECRYPT 2009, Milan, Italy, 7-10 July 2009.
  131. Programme Committee, Fifth International Conference on Information Assurance and Security (IAS09), Xi'an City, China, 18-20 August 2009.
  132. Programme Committee, 20th International Conference on Database and Expert Systems Applications (DEXA 2009), Linz, Austria, 31 August - 4 September 2009.
  133. Programme Committee, 6th International Conference on Trust, Privacy & Security in Digital Business (TrustBus ’09), Linz, Austria, 31 August - 4 September 2009.
  134. Programme Committee, Third International Conference on Internet Technologies and Applications (ITA09), Wrexham, North Wales, 8-11 September 2009.
  135. Programme Committee, Annual Conference of the South African Institute of Computer Scientists and Information Technologists (SAICSIT 2009), Vaal River, South Africa, 13-14 October 2009.
  136. Programme Committee, 3rd International Conference on Network and System Security (NSS 2009), Gold Coast, Australia, 19-21 October 2009.
  137. Programme Committee, 4th International Workshop on Security (IWSEC 2009), Toyama, Japan, 28-30 October 2009.
  138. Programme Committee, FTRG International Workshop on Advances in Cryptography, Security and Applications (ACSA-09), Jeju, Korea, 11-12 December 2009.
  139. Reviewer, International Conference on "Developments in eSystems Engineering" (DeSE '09), Abu Dhabi, United Arab Emirates, 14-16 December 2009.
  140. Technical Programme Committee, 6th IEEE International Workshop on Digital Rights Management (IEEE CCNC DRM 2010), Las Vegas, Nevada, 13 January 2010.
  141. Programme Committee, 19th Annual EICAR Conference, Paris, France, 8-11 May 2010.
  142. Programme Committee, 2nd International Workshop on Managing Insider Security Threats (MIST 2010), Morioka, Iwate, Japan, 14-15 June 2010.
  143. Programme Committee, European Conference on i-Warfare and Security (ECIW 2010), Thessaloniki, Greece, 1-2 July 2010.
  144. Program Committee, International Conference on Security and Cryptography (SECRYPT 2010), Athens, Greece, 26-28 July 2010.
  145. Programme Committee, IADIS International Conference on e-COMMERCE 2010, Freiburg, Germany, 28-30 July 2010.
  146. Programme Committee, 9th Annual Information Security South Africa Conference (ISSA 2010), Johannesburg, South Africa, 2-4 August 2010.
  147. Programme Committee, Sixth International Conference on Information Assurance and Security (IAS 2010), Atlanta, USA, 23-25 August 2010.
  148. Programme Committee, 7th International Conference on Trust, Privacy and Security in Digital Business (TrustBus'10), Bilbao, Spain, 30 August - 3 September 2010.
  149. Programme Committee, 25th IFIP International Information Security Conference (SEC 2010), Brisbane, Australia, 20-23 September 2010.
  150. Programme Committee, 7th European Workshop on Public Key Services, Applications and Infrastructures (EuroPKI’10), Athens, Greece, 23-24 September 2010.
  151. Programme Committee, 2010 Annual Conference of the South African Institute of Computer Scientists and Information Technologists (SAICSIT 2010), Bela Bela, South Africa, 11-13 October 2010.
  152. Programme Committee, IFIP IDMAN 2010 - 2nd IFIP WG 11.6 Working Conference on Policies & Research in Identity Management (IDMAN’10), Oslo, Norway, 18-19 November 2010.
  153. Programme Committee, 5th International Workshop on Security (IWSEC 2010), Kobe, Japan, 22-24 November 2010.
  154. Programme Committee, FTRG 2010 International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA-10) Seoul, Korea, 9-11 December 2010.
  155. Technical Program Committee, 7th IEEE International Workshop on Digital Rights Management Impact on Consumer Communications (DRM 2011), Las Vegas, Nevada, 9 January 2011.
  156. Technical Program Committee, Second International Conference on Technical and Legal Aspects of the e-Society (CYBERLAWS 2011), Gosier, Guadeloupe, France, 23-28 February 2011.
  157. Programme Committee, 20th Annual EICAR Conference (EICAR 2011), Krems, Austria, 9-10 May 2011.
  158. Programme Committee, 6th Annual Conference Security and Protection of Information (SPI), Brno, Czech Republic, 10-12 May 2011.
  159. Programme Committee, 26th IFIP International Information Security Conference (SEC2011) Lucerne, Switzerland, 7-9 June 2011.
  160. Programme Committee, Eighth Workshop on Security in Information Systems (WOSIS 2011), Beijing, China, 8-11 June 2011.
  161. Programme Committee, International Conference on Security and Cryptography - SECRYPT 2011, Seville, Spain, 18-21 July.
  162. Programme Committee, IADIS International Conference on e-COMMERCE 2011, Rome, Italy, 21-23 July 2011.
  163. Programme Committee, 2nd International Cyber Resilience Conference (ICR2011), Perth, Australia, 1-2 August 2011.
  164. Programme Committee, 10th Annual Information Security South Africa Conference (ISSA 2011), Johannesburg, South Africa, 15-17 August 2011.
  165. Programme Committee, Fourth International Conference on Internet Technologies and Applications (ITA11), Wrexham, North Wales, 6-9 September 2011.
  166. Programme Committee, 6th International Conference on Critical Information Infrastructures Security (CRITIS 2011), Lucerne, Switzerland, 8-9 September 2011.
  167. Programme Committee, 2011 European Intelligence and Security Informatics Conference (EISIC 2011), Athens, Greece, 12-14 September 2011.
  168. Program Committee, 8th European Workshop on PKI, services and applications (EUROPKI 2011), Leuven, Belgium, 15-16 September 2011.
  169. Program Committee, 2011 Annual Conference of the South African Institute of Computer Scientists and Information Technologists (SAICSIT 2011), Cape Town, South Africa, 3-5 October 2011.
  170. Programme Committee, 6th International Workshop on Security (IWSEC 2011), Tokyo, Japan, 8-10 November 2011.
  171. Programme Committee, Fourth International Conference on Developments in E-Systems Engineering (DESE2011), Dubai, UAE, 6-8 December 2011.
  172. Programme Committee, 9th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC2011), Sydney, Australia, 12-14 December 2011.
  173. Program Committee, Third International Conference on Technical and Legal Aspects of the e-Society (CYBERLAWS 2012), Valencia, Spain, 30 January – 4 February 2012.
  174. Programme Committee, 21stAnnual EICAR Conference (EICAR 2012), Lisbon, Portugal, 7-8 May 2012.
  175. Program Committee, Second International Workshop on Information Systems Security Engineering (WISSE’12), Gdańsk, Poland, 26 June 2012.
  176. Programme Committee, 11th European Conference on i-Warfare and Security (ECIW 2012), Laval, France, 5-6 July 2012.
  177. Program Committee, Tenth International Conference on Privacy, Security and Trust (PST'2012), Paris, France, 16-18 July 2012.
  178. Programme Committee, International Conference on Security and Cryptography - SECRYPT 2012, Rome, Italy, 24-27 July 2012.
  179. Programme Committee, 7th International Conference on Availability, Reliability and Security (ARES 2012), Prague, Czech Republic, 20-24 August 2012.
  180. Programme Committee, 4th International Workshop on Managing Insider Security Threats (MIST 2012), Fukuoka, Japan, 8-9 November 2012.
  181. Programme Committee, IEEE Asia Pacific Cloud Computing Congress 2012, Shenzhen, China, 14-17 November 2012.
  182. Programme Committee, 4th International Symposium on Cyberspace Safety and Security (CSS 2012), Melbourne, Australia, 12-13 December 2012.
  183. Programme Committee, Workshop on Information Security and Privacy (WISP) 2012, Orlando, Florida, 15 December 2012.
  184. Programme Committee, 3rd IFIP WG 11.6 Working Conference on Policies & Research in Identity Management (IDMAN ’13), Royal Holloway, University of London, UK, 17-19 December 2012.
  185. Programme Committee, 7th International Conference Security and Protection of Information (SPI’2013), Brno, Czech Republic, 22-24 May 2013.
  186. Programme Committee, "Security and Privacy in Healthcare IT" track, 26th IEEE International Symposium on Computer-Based Medical Systems, Oporto University, Portugal, 20-22 June 2013.
  187. Program Committee, Tenth Workshop on Security in Information Systems (WOSIS 2013), Angers, France, 3-7 July 2013.
  188. Programme Committee, Eleventh International Conference on Privacy, Security and Trust (PST'13), Tarragona, Spain, 17-19 July 2013.
  189. Progamme Committee, IADIS International Conference on e-Commerce 2013, Prague, Czech Republic, 24-26 July.
  190. Programme Committee, 10th International Conference on Security and Cryptography - SECRYPT 2013, Reykjavik, Iceland, 29-31 July 2013.
  191. Programme Committee, 24th International Conference on Database and Expert Systems Applications (DEXA 2013), Prague, Czech Republic, 26-30 August 2013.
  192. Programme Committee, 8th International Conference on Availability, Reliability and Security (ARES 2013), Regensburg, Germany, 2-6 September 2013.
  193. Programme Committee, International Conference on Cloud Security Management (ICCSM-2013), George Washington University, Seattle, USA, 17-18 October 2013.
  194. Programme Committee, 5th International Workshop on Managing Insider Security Threats (MIST 2013), Pukyung National University, Busan, Korea, 24-25 October, 2013.
  195. Programme Committee, Workshop on Information Security and Privacy (WISP) 2013, Milan, Italy, 14 December 2013.
  196. Programme Committee, 11th Workshop on Security in Information Systems (WOSIS 2014), Lisbon, Portugal, 27 April 2014.
  197. Programme Committee, 29th IFIP International Information Security and Privacy Conference (SEC 2014), Marrakech, Morocco, 2-4 June 2014.
  198. Program Board, 2nd International Conference on Human Aspects of Information Security, Privacy and Trust (HAS 2014), Heraklion, Crete, Greece, 22 - 27 June 2014.
  199. Programme Committee, 11th International Conference on Security and Cryptography - SECRYPT 2014, Vienna, Austria, 28-30 August 2014.
  200. Program Committee, Emerging Aspects in Information Security (EAIS'14), Warsaw, Poland, 7-10 September 2014.
  201. Programme Committee, 9th International Conference on Availability, Reliability and Security (ARES 2014), Fribourg, Switzerland, 8-12 September 2014.
  202. Program Committee, Second International Workshop on Emerging Cyberthreats and Countermeasures (ECTCM 2014), Fribourg, Switzerland, 8-12 September 2014.
  203. Programme Committee, 15th Joint IFIP TC6/TC11 Conference on Communications and Multimedia Security (CMS’2014), Aveiro, Portugal 25-26 September 2014.
  204. Program Committee, 8th International Conference on Network and System Security (NSS 2014), Xi'an, China, 15-17 October 2014.
  205. Reviewer, African Cyber Citizenship Conference 2014 (ACCC2014), Port Elizabeth, South Africa, 5-6 November 2014.
  206. Programme Committee, 6th International Workshop on Managing Insider Security Threats (MIST 2014), Republic of Korea, 21-22 November 2014.
  207. Programme Committee, 1st International Conference on Information Systems Security and Privacy (ICISSP 2015), Angers, France, 9-11 February 2015.
  208. Programme Committee, 2015 International Symposium on Advances in Computing, Communications, Security, and Applications for Future Computing (ACSA-15), Jeju, Korea, 24-26 February 2015.
  209. Program Committee, 12th International Workshop on Security in Information Systems (WOSIS 2015), Barcelona, Spain, 27 April 2015.
  210. Technical Programme Committee, 2nd Conference on Information Security (CIS 2015), Beijing, China, 24-26 May 2015.
  211. Programme Committee, Fifth International Workshop on Information Systems Security Engineering (WISSE’15), Stockholm, Sweden, 8-12 June 2015.
  212. Program Committee, 12th International Conference on Security and Cryptography (SECRYPT 2015), Colmar, France, 20-22 July 2015.
  213. Programme Committee, 12th International Conference on e-Commerce and Digital Marketing 2015, Las Palmas de Gran Canaria, Spain, 21-23 July 2015
  214. Program Board, 3rd International Conference on Human Aspects of Information Security, Privacy and Trust (HAS 2015), Los Angeles, CA, USA, 2-7 August 2015.
  215. Programme Committee, 7th International Symposium on Cyberspace Safety and Security (CSS 2015), New York, USA, 24-26 August 2015.
  216. Programme Committee, 10th International Conference on Availability, Reliability and Security (ARES 2015), Toulouse, France, 24-28 August 2015.
  217. Programme Committee, Third International Workshop on Emerging Cyberthreats and Countermeasures (ECTCM 2015), Toulouse, France, 24-28 August 2015.
  218. Programme Committee, International Workshop on Multimedia Forensics and Security (MFSec 2015), Toulouse, France, 24-28 August 2015.
  219. Programme Committee, 26th International Conference on Database and Expert Systems Applications (DEXA 2015), Valencia, Spain, 1-4 September 2015.
  220. Programme Committee, 12th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2015), Valencia, Spain, 1-2 September 2015.
  221. Program Committee, 14th International Conference of the Biometrics Special Interest Group (BIOSIG 2015), Darmstadt, Germany, 9-11 September 2015.
  222. Program Committee, 2nd Workshop on Emerging Aspects in Information Security (EAIS'15), Lodz, Poland, 13-16 September 2015. 
  223. Program Committee, 3rd International Conference on Innovative Network Systems and Applications (iNetSApp'15), Lodz, Poland, 13-16 September 2015.
  224. Program Committee, 2nd Workshop on Security in highly connected IT systems (SHCIS ’15), Vienna, Austria, 21-25 September 2015.
  225. Programme Committee, 7th ACM CCS International Workshop on Managing Insider Security Threats (MIST 2015), Denver, Colorado, 12-16 October 2015.
  226. Programme Committee, International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec 2015), Hangzhou, China, 16-18 November 2015.
  227. Programme Committee, 6th International Conference on e-Democracy (e-Democracy 2015), 10-11 December 2015, Athens, Greece.
  228. Program Committee, 2nd International Conference on Information Systems Security and Privacy (ICISSP 2016), Rome, Italy, 19-21 February 2016.
  229. Reviewer, 2nd Biennial International Conference on the use of Pads in Higher Education (ihe2016), San Francisco, USA, 16-18 March 2016.

Current MPhil/PhD Supervisions

Completed MPhil/PhD Supervisions

Examination of research degrees

2015 The development and evaluation of an Information Security Awareness Capability Model: Linking ISO/IEC 27002 controls with Awareness Importance, Capability and Risk, PhD thesis, University of Southern Queensland, Australia
2015 MobiLeak: Security and Privacy of Personal Data in Mobile Applications. PhD thesis, Royal Institute of Technology, Sweden.
2015 A Biometric Security System Using Dorsal Hand Vein Patterns and Palmprints, PhD thesis, University of Mauritius, Mauritius.
2015 Multi Provision Service based Internet charging Scheme, PhD thesis, University of Technology Sydney, Australia.
2015 Exploring the Memorability of Multiple Recognition-Based Graphical Passwords and Their Resistance to Guessability Attacks, PhD thesis, University of Glasgow, UK.

2014 Information security risk management in Australian real estate sectors, PhD thesis, University of South Australia, Australia.
2014 A Model to improved Smartphone Information Security Awareness, PhD thesis, University of Fort Hare, South Africa
2014 A Noun-Based Approach to Support Location and Recency of Developers’ Activities for Improving Automatic Bug Assignment, PhD thesis, University of Malaya, Malaysia.
2014 A Secure and Scalable Communication Framework for Inter-Cloud Services, PhD thesis, City University, UK.
2014 On Methodologies to Select Systems for Automated Personal Identification, PhD thesis, Royal Holloway University of London, UK.
2014 Secure Management of Multi-Application Mobile Platforms, PhD thesis, KTH Royal Institute of Technology, Sweden (assessed as Quality Reviewer, post-examination)
2014 A Value Framework for Information and Communication Technology in South African Higher Education Institutions, PhD thesis, Nelson Mandela Metropolitan University, South Africa.
2014 Energy-Efficient Data Security Schemes for Mobile Users in Cloud Environment, PhD thesis, University of Malaya, Malaysia. 

2013 Trusted Channels and Roots of Trust in Distributed Embedded Systems, PhD thesis, Macquarie University, Australia. 
2013 An Exploration of the Factors Influencing Home Users’ Cybersecurity Behaviours, PhD thesis, Victoria University of Wellington, New Zealand. 
2013 Risk Analysis Using “Conflicting Incentives” as an Alternative Notion of Risk, PhD thesis, Gjovik University College, Norway. 
2013 An Ecologically Valid Evaluation of an Observation-Resilient Graphical Authentication Mechanism, PhD thesis, University of Glasgow, UK. 
2013 Investigating Information Systems Security Management Maturity for Small Medium Industries and Enterprises Electronic Commerce Using Technology, Organization and Enterprise Framework, PhD thesis, University of Malaya, Malaysia. 
2013 A method for analysing Value–Based Compliance in Information Systems Security, PhD thesis, Orebro University, Sweden. 
2013 Adaptable Middleware Framework for Interactive Services in Pervasive Computing, PhD thesis, Anna University, India. 
2013 Effective Online Privacy Mechanisms with Persuasive Communication, PhD thesis, Cranfield University, UK. 

2012 A Baseline for Information Security Knowledge for End Users, MTech thesis, Nelson Mandela Metropolitan University, South Africa.
2012 A Code of Conduct for Computer Forensic Investigators, Professional Doctorate, University of East London, UK. 
2012 An Examination of Information System Risk Perception Using the Repertory Grid Technique, PhD Thesis, University of Adelaide, Australia. 
2012 Security Awareness in Western Australian Online Banking Users of Phishing Attacks, Professional Doctorate, Edith Cowan University, Australia. 
2012 A Method for Securing Online Community Service: A Study of Selected Western Australian Councils, Professional Doctorate, Edith Cowan University, Australia. 
2012 A Framework for the development of a Personal Information Security Agent. MTech thesis, Nelson Mandela Metropolitan University, South Africa. 

2011 Valuation and Reporting of Security Assurance at Operational Systems Level, PhD thesis, University of East London, UK. 
2011 A Scalable, Distributed and Secure Position-based Routing Protocol for Ad-Hoc Networks, PhD thesis, University of Malaya, Malaysia. 
2011 Towards an Information Security Framework for Government to Government: A Perspective from East Africa, PhD thesis, University of South Africa, South Africa. 
2011 Educating users about information security by means of game play, MTech thesis, Nelson Mandela Metropolitan University, South Africa. 
2011 A Model for Privacy-Aware Presence Management in Mobile Communications, PhD thesis, Nelson Mandela Metropolitan University, South Africa. 
2011 A Tactical Management Model of Forensic Evidence Processes, PhD thesis, University of Western Australia. 

2010 Analysis Avoidance Techniques of Malicious Software, PhD thesis, Edith Cowan University, Australia. 
2010 Securing Home & Correspondent Registrations in Mobile IPv6 Networks, PhD thesis, University of Manchester, UK. 
2010 Authentication in Health Services, PhD thesis, University of Oslo, Norway.

2009 Vulnerabilities in Class One Electronic Product Code Radio Frequency Identification Systems, PhD thesis, Edith Cowan University, Australia.
2009 A Framework for Assessing Certification Schemes for IT Security Professionals, PhD thesis, Deakin University, Australia. 
2009 Network Firewalls Dynamic Performance Evaluation and Formalisation, PhD thesis, Napier University, UK.
2009 E-Business Information Systems Security Design Paradigm and Model, Royal Holloway University of London, UK. 

2008 Authentication and Privacy in Mobile Web Services, PhD thesis, City University, UK.
2008 Enhancing Password based authentication by incorporating typing dynamics, MPhil to PhD transfer, University of Mauritius, Mauritius.
2008 Cultivating and Assessing Information Security Culture, PhD thesis, University of Pretoria, South Africa. 
2008 A Systems Analysis Method for Online Teaching and Learning Systems, PhD thesis, Deakin University, Australia. 
2008 Assessing the Risk to Information Systems and Processes from Malicious Electromagnetic Threats – Through the Development of Diagnostic and Detection Techniques, PhD thesis, University of Glamorgan, UK.
2008 Optimization in Multi-Agent Systems, PhD thesis, Cork Institute of Technology, Ireland. 
2008 Safeguarding Australia from Cyber-terrorism: A Proposed Cyber-terrorism SCADA Risk Framework for Australia, PhD Thesis, Monash University, Australia.

2007 On the Identification of Security Vulnerabilities, PhD thesis, Royal Holloway, University of London, UK.
2007 An investigation into information security in general medical practice, PhD thesis, Edith Cowan University, Australia.
2007 An Approach Towards Standardising Vulnerability Categories, MSc by research, University of Pretoria, South Africa. 
2007 Usable Security Policies in Runtime Environments. PhD thesis, Linköping University, Sweden.
2007 Masquerader Detection in Mobile Context based on Behaviour and Environment Monitoring. PhD thesis, University of Jyvaskyla, Finland.

2006 An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer Networks. PhD thesis, University of Surrey, UK.
2006 Program Behaviour Modelling with Flexible Logical Entity Abstraction, PhD thesis, University of Ballarat, Australia.
2006 Multi-Party Non-Repudiation Protocols and Applications, PhD thesis, University of Malaga, Spain.
2006 Digital Forensic Evidence Collection by System Activity Logs, PhD thesis. University of Melbourne, Australia.
2006 Towards a Framework for Corporate Information Governance, MTech dissertation, Nelson Mandela Metropolitan University, South Africa.

2005 Delegating Signing Power to Mobile Agents: Algorithm and Protocol Designs. PhD thesis. University of Manchester, UK.
2005 The Australian Small to Medium Enterprise E-Business Security Methodology. PhD thesis. Deakin University, Australia.
2005 Changing the Way the World Thinks about Computer Security. PhD by publication. Middlesex University, London, UK.
2005 An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer Networks. MPhil to PhD transfer, University of Surrey, UK.
2005 A Simulation Study of Traffic Conditioner Performance. MSc by research. University of Pretoria, South Africa. 
2005 Holistic Information Security Management Framework. Doctoral Thesis. Karlstad University, Sweden.
2005 Intrusion Detection and Protection of Application Servers. Licentiate thesis. Chalmers University, Sweden.

2004 Secure and Distributed Multicast Address Allocation on IPv6 Networks. MSc by research. University of Pretoria, South Africa.
2004 A Tool-kit for XML-based and process-oriented Application Integration. PhD thesis. Cork Institute of Technology, Ireland
2004 Threats to Information Systems and Effective Countermeasures. PhD by publication. University of Glamorgan, UK
2004 DiDDeM: A system for early detection of denial-of-service attacks. PhD thesis. Liverpool John Moores University, UK.
2004 Protecting agents against malicious host attack. PhD thesis. Aston University, UK.
2004 Comprehensive strategy on security of electronic networks. MPhil thesis. University of Bradford, UK.
2004 NeGPAIM: A model for the proactive detection of information security intrusions. PhD thesis. Port Elizabeth Technikon (South Africa)

2003 Inferential analysis of incomplete audit data sets. PhD thesis. University of Glamorgan, UK.
2003 Interactive Generation of Uniformly Random Samples of World Wide Web Pages. MSc by Research thesis. Kingston University, UK.
2003 Enterprise IT Security Data Model and security of the Internet. MPhil thesis. Coventry University, UK.

2002 Distributed Failure Restoration for ATM Tactical Communication Networks. Ph.D. thesis. De Montfort University, UK.
2002 An Anomaly Intrusion Detection System Based on Intelligent User Recognition. Ph.D. thesis. University of Jyvaskyla, Finland.
2002 The evolving nature of fraud investigation and prevention. Ph.D. thesis. Deakin University, Australia.

2001 Design and Implementation of an Intranet-Solution especially with Workflow Aspects. M.Sc. thesis. Cork Institute of Technology, Ireland.

2000 Methods for Intelligent User Recognition Based on Machine Learning Techniques in Anomaly Intrusion Detection. Licentiate thesis. University of Jyvaskyla, Finland.
2000 Human-Computer Interaction via Telephone. M.Sc. thesis. Cork Institute of Technology, Ireland.
2000 Software Component Reuse by Adaptation. Ph.D. thesis. Cork Institute of Technology, Ireland.

Invited Presentations, Lectures, etc.

  1. “Assessing current & future threats“, Invited Discussant, CERRE Expert Workshop – Cybersecurity: Safeguarding Europe’s Essential Infrastructure, Brussels, Belgium, 19 November 2015.
  2. “Securing the i-Society”, Keynote presentation, IEEE i-Society 2015, London, UK, 9 November 2015. Invited event chair, 5th Annual Payments Conference 2015, London, UK, 22 October 2015.
  3. “Educating Towards Cyber Security Professionalism”, Invited speaker, 4th International Conference on Cyber Security and Education, Alloa, Scotland, 16 October 2015.
  4. “Controlling Privacy – User expectations versus usability”, Invited speaker, CriM15 / Oulu Winter School, Oulu, Finland, 13 October 2015.
  5. “How to Articulate Risk to Senior Management”, Invited panelist, InfoSecurity Magazine Fall Virtual Conference - North America, 30 September 2015.
  6. “Mobile devices, immobile security?”, Keynote presentation, 9th International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST 2015), Cambridge, UK, 10 September 2015.
  7. “Addressing the Security Risks of Negligent Insiders”, Invited panellist, InfoSecurity Magazine Webinar, 31 July 2015.
  8. “Mobile Device Security – Whose Device? Whose Data? Whose Problem?”, Special Keynote Presentation, Maximising Mobile Technology and Learning Forum, London, UK, 8 July 2015.
  9. “Creating a Company-Wide Information Security Culture”, Invited panellist, InfoSecurity Magazine Webinar, 19 June 2015.
  10. “Getting the measure of cybercrime?”, invited talk, University of Oxford, 5 June 2015.
  11. “Building national cybersecurity workforces”, invited panellist, 9th IFIP WG 11.8 World Conference (WISE 9). Hamburg, Germany, 26 May 2015.
  12. “Security and Privacy – All under control?”, Guest talk, 14th Annual Security Conference, Las Vegas, 19 May 2015.
  13. “Examining the Security Experience”, invited talk, Birmingham City University, Birmingham, UK, 7 May 2015.
  14. “Biometric Authentication: Feasibility and Fallout”, invited talk, PAY-SEC Payment Security Summit, London, UK, 21 April 2015.
  15. “Mobile biometrics: Who you are, wherever you go”, invited talk, European Biometrics Symposium, Teddington, UK, 25 February 2015.
  16. “From Passwords to Biometrics: In Pursuit of a Panacea”, Keynote Presentation, 1st International Conference on Information Systems Security and Privacy (ICISSP 2015), Angers, France, 9-11 February 2015.
  17. “Privacy and Trust in Digital Societies”, Invited panelist, 1st International Conference on Information Systems Security and Privacy (ICISSP 2015), Angers, France, 9-11 February 2015.
  18. “Spotlight on mobile technology: Utilising and integrating to improve teaching and learning”, Invited panellist, Bett 2015, London, UK, 22 January 2015.
  19. “Safeguarding Devices and Data - Reinforcing the Need for Security In Mobile Learning”, Special Keynote Presentation, Transforming Further and Higher Education Through Mobile and Technology Enhanced Learning, London, UK, 9 December 2014.
  20. “Mobile Security: The Challenge of Liberation”, Keynote Presentation, International Conference for Internet Technology and Secured Transactions (ICITST-2014), London, UK, 8 December 2014.
  21. Invited event chair, 4th Annual Payments Conference 2014, London, UK, 6 November 2014.
  22. “In Defence of the Password”, invited talk, Public Research Centre Henri Tudor, Luxembourg, 22 October 2014.
  23. “Cyber Security: Can we keep up?”, Guest lecture, European Council of Georgia Study Abroad Program, London, 14 July 2014.
  24. Invited event chair, 2nd Annual Omnichannel Banking Conference 2014, London, UK, 19 June 2014.
  25. “Ensuring Security within Mobile Learning Strategies: Safeguarding Data and Devices”, invited presentation, Mobile Learning 2014: Transforming the Delivery of Further and Higher Education, London, UK,18 June 2014.
  26. “How to develop a strong authentication strategy to enhance security, business performance and user experience”, Invited panellist, Infosecurity Magazine Summer Virtual Conference 2014, 17 June 2014.
  27. “Flexible and Non-Intrusive Authentication”, invited presentation, Cloud Computing Security and Identity Workshop National Museum of Computing, Bletchley, UK, 3-4 April 2014.
  28. Invited track chair, Technology Innovation Track, The 11th Annual Retail Fraud Conference 2014, London, 2 April 2014.
  29. “Ensuring our Digital Security”, invited presentation, Employability for the Digital Age, British Council, Johor Bahru, Malaysia, 26 March 2014.
  30. “Bitcoin and other Crypto-currencies – Will they thrive once regulated?”, Panel session, Kaspersky Academy CyberSecurity for the Next Generation – Asia-Pacific and MEA, Seoul, South Korea, 12 March 2014.
  31. “Biometrics: A Triumph of Convenience over Security?”, invited presentation, Kaspersky Academy CyberSecurity for the Next Generation – Asia-Pacific and MEA, Seoul, South Korea, 12 March 2014.
  32. ”Your Device - Everybody’s Problem?”, HEA Changing the Learning Landscape – Bring your Own Device conference, University of Southampton, 7 March 2014.
  33. “Recognising and Responding to Mobile Device Threats”, International Islamic University Malaysia, Kuala Lumpur, 20 February 2014.
  34. “Cyber Security: Power to the People?”, IET Devon and Cornwall Cyber Security event, Plymouth University, 29November 2013.
  35. “Convenient to Carry, Difficult to Defend: The Security Challenge of Smartphones and Tablets”, Invited webcast, BrightTALK Application Security Summit, 12 November 2013.
  36. “Making Security Tolerable”, University of Malaya, Kuala Lumpur, 1 November 2013.
  37. Invited event chair, Payments Conference 2013, London, UK, 30 October 2013.
  38. “Are we finally getting past passwords“, Orebro University, Sweden, 15 May 2013.
  39. “More than just technology hype: recognising the Big Risk of Big Data”, Panel Chair, Telco Cloud World Forum, London, 17 April 2013.
  40. “Vulnerability Management – The Never-Ending Story”, Invited webcast, BrightTALK Application Security Summit, 17 April 2013.
  41. “Can we keep up with the Cyber Arms Race?”, Panel session, Kaspersky Lab Asia Pacific & MEA Cup 2013, Singapore, 22 March 2013.
  42. “2020 Vision: Enabling and Securing the Enterprise of the Future”, Invited panellist, Infosecurity Webinar, 19 February 2013.
  43. “Is Security Awareness a Waste of Time?”, Invited panellist, Infosecurity Webinar, 24 January 2013. 
  44. “Infosec: Lots of safeguards and no protection?”, Keynote presentation, secau Security Congress, Perth, Western Australia, 5 December 2012. 
  45. “Delivering OERs to an international audience via iTunes U”, invited presentation, Opening up: New horizons and institutional strategies, London, 4 October 2012. 
  46. “My mobile device is jailbroken - will you secure it?”, Invited panellist, Infosecurity UK Virtual Conference, 27 September, 2012. 
  47. “Next-Generation Threats: Old Problems in a New Guise?”, Invited webcast, BrightTALK Next-Generation Threat Protection Summit, 5 September 2012. 
  48. “iTunes U”, Invited presentation, Apple Executive Briefing Center, London, 24 August 2012. 
  49. “The Long Shadow of Cyber Crime”, Webinar Panel, Business Tech Debate, Financial Times, London, 16 August 2012. 
  50. “Cyber Security for SMBs”, Webinar Panel, Kaspersky Lab, London, 28 June 2012. 
  51. “Mobile Malware: Finally hitting the moving target?”, Invited webcast, BrightTALK Hackers and Threats Summit, 21 June 2012. 
  52. Invited event co-chair, Secure Information Conference 2012, London, UK, 15 March 2012. 
  53. “Phishing deeper: An increasing threat in the evolving Web”, Invited webcast, BrightTALK Web 2.0 Security Summit, 8 February 2012. 
  54. “New Approaches to New Dangers”, Panel sessions, Kaspersky Lab US Cup 2011, New York, United States, 10 November 2011. 
  55. “21st Century Threats Facing End-Users”, Keynote presentation, Information Security South Africa (ISSA) 2011, Johannesburg, South Africa, 15 August 2011. 
  56. “Are We High In The Clouds?”, Panel session, Kaspersky Lab International Cup 2011, Munich, Germany, 15 April 2011. 
  57. “Beyond Security Awareness: Achieving culture and avoiding fatigue”, Keynote presentation, Security Forum 2011, Hagenberg, Austria, 6 April 2011. 
  58. “Usable Security: Can it be too easy?”, University of Kent, 22 March 2011. 
  59. “Single Sign On: Convenience or Risk?”, Invited Online Panel, BrightTALK Web 2.0 Security Summit, 16 March 2011. 
  60. “Preparing for the future Internet: IT-Security in a connected world”, Panel session, Kaspersky Lab Asia Pacific & MEA Cup 2011, Shah Alam, Selangor, Malaysia, 5 March 2011. 
  61. “Meeting new demands for user authentication”, Invited webcast, BrightTALK Authentication Summit, 7 October 2010. 
  62. “Getting tricky: The many faces of social engineering”, Symposium on Security and Cybercrime: Vision and Foresight, Edinburgh, UK, 25 June 2010. 
  63. “Security and Usability: Where technology meets the people”, Khalifa University of Science, Technology and Research, Sharjah, UAE, 14 June 2010. 
  64. “The threat on the net: Attacking technology and those who need”, Invited Speaker, Critical National Infrastructure Protection Workshop (CNIP2010), Mumbai, India, 15 May 2010. 
  65. “Online identity and authentication: The varying degree of being me”, Invited webcast, BrightTALK Identity and Access Management Summit, 6 May 2010. 
  66. “Essential Mobile Data Security: Keeping data safe and accessible for mobile workers”, Invited Speaker, Public Sector Mobile and Flexible Working: Achieving Real Efficiencies, Birmingham, UK, 25 February 2010. 
  67. “The Irreversible March of Technology”, Invited Speaker, Human Factors in Information Security Conference, London, UK, 23 February 2010. 
  68. “Securing mobile devices: Concepts, policies and technologies”, Middlesex University, 29 January 2010. 
  69. “Usability of Security”, University of Piraeus, Greece, 18 December 2009. 
  70. “Protecting your network from portable devices”, Invited webcast, BrightTALK Endpoint Security Summit,8 December 2009. 
  71. “Are we really Managing the Threat“, Expert Panel, 2009SECAU Security Congress, Perth, Western Australia, 3 December 2009. 
  72. "Going, going, gone? The challenges of mobile security", Invited Speaker, International Conference on Information Security and Digital Forensics 2009, City University, London, 8 September 2009. 
  73. “Global Cyber Threats”, Invited seminar, University College London, 22 June 2009. 
  74. “Protected or Perplexed? The challenge of usable security”, Invited talk, IT-security for the new generation, Kaspersky Lab, Moscow, 29 April 2009. 
  75. “Effective Peer Strategies”, Invited speaker, Safeguarding Cyberworld Conference, Plymouth, UK, 10 February 2009. 
  76. “Enhancing User Authentication for Mobile Devices“, Invited talk, INDIA-SIM 2009, Bangalore, India, 22-23 January 2009. 
  77. “Social Engineering: Exploiting the Weakest Links”, University of Portsmouth, 16 January 2009. 
  78. “Web 3.0: Third time lucky for e-Safety and Security”, Invited speaker, South West Grid for Learning eSafety Conferences, Torquay, Bristol and Bournemouth, 25-27 November 2008.
  79. “Cybercrime: Hackers, Malware and other online threats”, Keynote Lecture, IT-Speicher, Regensburg, Germany, 24 July 2008.
  80. “Securing the end-user: What they know and what they do”, Keynote Lecture, Third International Conference on Usability Engineering, University of Oviedo, Spain, 20 May 2008. 
  81. “Cybercrime: A Clear and Present Danger”, University of Exeter, 13 May 2008. 
  82. “Keystroke dynamics: An authentication enhancement for mobile devices”, Gjøvik University College, Gjøvik, Norway, 31 January 2008.
  83. “Combating Identity Theft: Recognising contributors to the problem”, Invited speaker, Net Focus UK 2007, Southampton, 2 October 2007. 
  84. “How Do You Secure Mobile Devices in a World Where Data Leakage is Pervasive”, Invited workshop moderator, Net Focus UK 2007, Southampton, 2 October 2007. 
  85. “Cybercrime: The continuing threat”, University of Exeter, 18 May 2007. 
  86. “Are You Even Remotely Secure? The Mobile Device Dilemma”, Keynote Panel presentation, Infosecurity Europe 2007, Olympia, London, 25 April 2007. 
  87. “Usability Challenge - Why users can’t use security”, Aston University, 1 November 2006.
  88. “Managing the security of information assets”, Managing Information Throughout the Organisation Conference, Guernsey, 13 September 2006.
  89. Invited panellist, Security Panel. Mobility Summit 2006, London, 4 July 2006. 
  90. “Protected or confused: Assessing whether end-users can understand and use security”, Invited speaker, End Point Security 2006, London, 28 June 2006. 
  91. “Cybercrime and investigation”, University of Exeter, 10 May 2006. 
  92. “Mitigating the Enemy Within”, Keynote Panel presentation, Infosecurity Europe 2006, Olympia, London, 25 April 2006. 
  93. “Continuous user identify verification using keystroke analysis”, BCS SGAI Symposium/Colloquium on Intelligence in Security and Forensic Computing, Edinburgh, 3 April 2006. 
  94. “The Challenge of Usable IT Security”, Keynote presentation, Usability Engineering, University of Oviedo, Spain, 23-24 March 2006.
  95. “The way forward – Where to from here?”, Expert Panel, 1st Colloquium for Information Systems Security Education – Asia Pacific, Adelaide, Australia, 22 November 2005. 
  96. “Hitting easy targets: The Internet threats facing end-users”, University of Malaga, Spain, 28 October 2005. 
  97. “Internet insecurity: Who's trying to spoil your day today?”, Keynote presentation at ITA 2005 - International conference on Internet Technologies and Applications, Wrexham, North Wales, 8 September 2005. 
  98. “Fostering the usability of information security solutions“, APEC-OECD Workshop on the Security of Information Systems and Networks, Seoul, Korea, 6 September 2005. 
  99. "Educating And Raising Awareness Of Governance Company Wide", Keynote Panel, Infosecurity Europe 2005, Olympia, London, 26 April 2005.
  100. "Get patched or get punched: Plugging the security holes before the attackers hit you", Northampton BCS, 8 March 2005.
  101. "The requirements and challenges of automated intrusion response", University of Birmingham, 20 January 2005.
  102. "Enemies within? : Managing the problem of insider attacks and misuse", Keynote presentation at InfoSec 2004, Fremantle, Western Australia, 26th November 2004"
  103. "Cyber Parasites: The ongoing march of malware", Australian Institute of Professional Intelligence Officers, Perth, Western Australia, 19th November 2004.
  104. "Malware Evolution: The arrival of the true computer parasite?", University of Wales, 3 November 2004.
  105. "Biometric user authentication using keystroke dynamics", University of Bristol, 2 November 2004.
  106. "Cyber Threats: What are the issues and who sets the agenda?", 5th International Relations Conference, The Hague, The Netherlands, 9-11 September 2004.
  107. "The Darker Side of Innovation", Expert Panel, 7th Working Conference on IT Innovation for Adaptability and Competitiveness, Leixlip, Ireland, 30 May-2 June 2004.
  108. "E-commerce Security: Getting Consumers to Trust the Net", Keynote Presentation, IV Jornadas Internacionales sobre comercio electronico, Oviedo, Spain, 25-27 November 2003.
  109. "Cybercrime", Keynote Presentation, International Conference on Web Engineering (ICWE'03), Oviedo, Spain, 16-18 July 2003.
  110. "Insider IT Misuse", Interpol IT Crime Forum, The Hague, 21 May 2003.
  111. "Cybercrime", Faculty Research Seminar, Middlesex University, 26 March 2003.
  112. "Cybercrime Expert Panel", SecurIT Summit, Montreux, Switzerland, 19-21 October 2002.
  113. "Security requirements for online distance learning", ELATnet modules for multimedia netbased teaching International Workshop, Munich, Germany, 18-20 September 2002.
  114. "Mobile Security Biometrics", Global Information Society Forum.31, Tokyo, Japan, 23 May 2002.
  115. "Cybercrime: Vandalising the Information Society", Guest lecture, Middlesex University, 23 April 2002.
  116. "User Authentication Methods for Mobile Systems", Managing the Mobile Workforce, The Open Group Conference, Paris, France, 9 April 2002.
  117. "Security issues in Online Distance Learning", JCALT Workshop on Security in Virtual Learning Environments, South Bank University, UK. 23 October 2000.
  118. "E-commerce: Consumer security fears and expectations", British Computer Society – South West Branch, University of Plymouth, UK. 11 April 2000.
  119. "Realising Security Policy within the Healthcare Environment", University of Cambridge, UK. 3 December 1998.
  120. "Computer Abuse: Vandalising the Information Society", British Computer Society – South West Branch, University of Plymouth, UK. 21 January 1997.