Steve Furnell

Professor Steve Furnell

    Overview

    Profile summary

    Visiting Professor of Cyber SecurityProfessor of Cyber Security, University of NottinghamAdjunct Professor, Edith Cowan University, Perth, Western AustraliaHonorary Professor, Nelson Mandela Metropolitan University, South AfricaVisiting Professor of Cyber Security, University of Suffolk

    Professional memberships

    Fellow, British Computer Society Fellow, Chartered Institute of Information Security (FCIIS)Senior Member, Institute of Electrical and Electronic EngineersSenior Member, Association of Computing MachineryPrincipal Fellow, Higher Education Academy

    Roles on external bodies

    Societies and international groups UK national representative, Technical Committee 11 (Security and Privacy Protection in Information Processing Systems), International Federation for Information Processing (IFIP) Board Member, Chartered Institute of Information Security Chair, Institute for Information Security Professionals, South West Branch Chair, IFIP Technical Committee 11 - Security and Privacy Protection in Information Processing Systems Member, IFIP TC 11, Working Group 11.1 - Information Security Management Member, IFIP TC 11, Working Group 11.8 - Information Security Education Member, IFIF TC 11, Working Group 11.12 - Human Aspects of Information Security and Assurance Editorships and Refereeing for Journals Editor-in-Chief, Information and Computer Security Associate Editor, Computers & Security Associate Editor, The Computer Journal Associate Editor, Journal of Information Systems Security Co-Editor, Journal of Information Warfare Editorial Board, EAI Transactions on Security and Safety Editorial Board, International Journal on Advances in Security Editorial Board, International Journal for Information Security Research Editorial Board, Future Internet Editorial Advisory Board, Internet Research Editorial Advisory Board, International Journal of Information and Learning Technology Other  2002-17, Chair, British Computer Society South West Branch 2014-16, Member, Costs of Cyber Crime Working Group, UK Home Office. 2013-15, Working Group Member, Dimension Three (Building Cyber Skills and Leadership) and Dimension Five (Controlling Risks Through Technology and Processes), Global Cyber Security Capacity Centre, Oxford Martin School, University of Oxford.

    Supervised research degrees

    PhD/MPhil completions (* denotes MPhil)As Director of Studies2019 Network Security Intelligence Centres for Information Security Incident Management2019 Advancing User Authentication and Access Management2019 Evaluation and Enhancement of Public Cyber Security Awareness2019 Transparent User Authentication for Mobile Applications2019 An evaluation of targeted security awareness for end users2019 Computational model of negotiation skills in virtual artificial agents2019 Decentralised Hosting and Preservation of Digital Collections2018 Acceptance factors of wearable computing: An empirical investigation2017 A Model for Monitoring End-User Security Policy Compliance2015 Authentication Aura: A cooperative and distributed approach to user authentication on mobile devices2015 Establishment of information security awareness and culture2013 The perspective of usability and perception in information security2013 The aggressive detection of network intrusions2012 Multi-Dimensional Personalisation for the online and offline world2012 Enhancing Automated Intrusion Response Systems2011 An Insider Misuse Threat Detection and Prediction Language2011 Behavioural profiling in mobile networks2011 A Study of Graphical Alternatives for User Authentication2010 Improving Intrusion Prevention, Detection and Response2008 Profiling methods for computer crime and abuse*2007 A Generic Architecture for Insider Misuse Monitoring in IT Systems2007 Two-Tier Intrusion Detection System for Mobile Ad hoc Networks2007 Effective information assurance with risk management2006 Active security vulnerability identification and resolution2006 Non-Intrusive Subscriber Authentication for Next Generation Mobile Communication Systems2004 A generic architecture for intrusion specification & misuse detection in IT systems*2004 Classifying and responding to network intrusions2004 Enhancing subscriber security for mobile phones using biometrics2004 User authentication and supervision in networked systems2001 A model for managing information flow on the World Wide Web2000 Flexible, composite multimedia medical record system for healthcare establishmentsAs supervisor2019 Facial Identification for Digital Forensic2019 A Model for User-centric Information Security Risk Assessment and Response2017 Behavioural Monitoring via Network Communications2017 Federated Authentication using the Cloud (Cloud Aura)2017 A Forensically-Enabled Cloud Computing Architecture2016 Automated Digital Forensics and Computer Crime Profiling2016 Opportunities and Risks in Online Gaming Environments2016 Graphical One-Time-Password Authentication2016 Multiple Stakeholder Perspectives of Complex Online Services: An e-Government Case Study2014 Sustainability Reporting Process Model using Business Intelligence2014 IT Governance in the Health Care Sector2014 Non-Intrusive Continuous User Authentication for Mobile Devices2014 Continuous User Authentication Using Multi-Modal Biometrics2012 A Holistic Approach to Information Security Culture2011 Anomaly-Based Correlation of IDS Alarms2010 Internet Marketing for Profit Organisations: A Framework for the implementation of Strategic Internet Marketing2007 Security Policy Enforcement in Application Environments using Distributed Script-based Control Structures2007 The social and psychological impact of SMS text messaging2007 Dynamic Adaptation of Streamed Real-Time E-Learning Videos over the Internet2004 Integrated multimedia communications for IP networks2004 Performance characterisation of IP networks2003 A Correlation Framework for Continuous User Authentication Using Data Mining2002 A Generic Network and System Management Framework2002 Security in a Distributed Processing Environment2001 Component architectures and their impact upon software development

    Teaching interests

    2019/20 delivery commitmentsUndergraduate SEC104 Cyber Security and NetworksSEC202 Secure Systems Architectures and MechanismsSEC301 Information Security Management and Governance*LAW3239 Cybercrime: Issues and Regulation Postgraduate SEC501 Information Security Management and Governance* * denotes module leadershipCourse development activity: Co-Architect of BSc (Hons) Computer & Information Security (2007) Architect of the MSc/MRes Information Systems Security (2003-04) Co-Architect of the MSc/MRes Network Systems Engineering (2002-03)

    Expertise related to UN Sustainable Development Goals

    In 2015, UN member states agreed to 17 global Sustainable Development Goals (SDGs) to end poverty, protect the planet and ensure prosperity for all. This person’s work contributes towards the following SDG(s):

    • SDG 1 - No Poverty
    • SDG 4 - Quality Education
    • SDG 5 - Gender Equality
    • SDG 6 - Clean Water and Sanitation
    • SDG 7 - Affordable and Clean Energy
    • SDG 9 - Industry, Innovation, and Infrastructure
    • SDG 11 - Sustainable Cities and Communities
    • SDG 12 - Responsible Consumption and Production
    • SDG 14 - Life Below Water
    • SDG 16 - Peace, Justice and Strong Institutions
    • SDG 17 - Partnerships for the Goals

    Fingerprint

    Dive into the research topics where Steve Furnell is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
    • 1 Similar Profiles

    Collaborations and top research areas from the last five years

    Recent external collaboration on country/territory level. Dive into details by clicking on the dots or