Steve Furnell

Professor Steve Furnell

    Filter
    Chapter

    Search results

    • 2023

      Biometric Technology and User Identity

      Furnell, S., Jan 2023, Regulating Cyber Technologies. Vol. 0. p. 81-110

      Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    • 2022

      A Holistic View of Cybersecurity Education Requirements

      Furnell, S. & Vasileiou, I., 2022, Research Anthology on Advancements in Cybersecurity Education. Vol. 0. p. 289-307

      Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    • 2021

      Delay-tolerant networks (DTNs) for deep-space communications

      Clarke, N. L., Ghita, B. V. & Furnell, S. M., 2021, Advances in Delay-Tolerant Networks (DTNs). Vol. 0. p. 47-58

      Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    • Information Security and Privacy – Challenges and Outlook

      Furnell, S., Haskell-Dowland, P., Agrawal, M., Baskerville, R., Basu, A., Bishop, M., Cuellar, J., Foresti, S., Futcher, L., Gal-Oz, N., Herath, T., Damsgaard, J. C., Johnston, A., Joosen, W., Livraga, G., Lopez, J., Marsh, S., Martinelli, F., Massacci, F. & Pasic, A. & 6 others, Schinagl, S., Shahim, A., Thomson, K.-L., Vaidya, J., Vance, T. & Warkentin, M., 2021, IFIP Advances in Information and Communication Technology. Vol. 0. p. 383-401

      Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    • 2020

      Technology Use, Abuse, and Public Perceptions of Cybercrime

      Furnell, S., 2020, The Palgrave Handbook of International Cybercrime and Cyberdeviance. Vol. 0. p. 45-66

      Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    • 2014

      Delay-tolerant networks (DTNs) for deep-space communications

      Clarke, N., Ghita, B. & Furnell, S., 20 Nov 2014, Advances in Delay-tolerant Networks (DTNs) Architecture and Enhanced Performance. Rodrigues, J. (ed.). Vol. 0.

      Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    • 2010

      Hackers, viruses and malicious software

      Furnell, S., 17 Dec 2010, Handbook of Internet Crime. Jewkes, Y. & Yar, M. (eds.). Vol. 0. p. 173-193 654 p.

      Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    • Insider Threat Specification as a Threat Mitigation Technique

      Magklaras, G. & Furnell, S., 1 Sept 2010, Insider Threats in Cyber Security. Probst, C. (ed.). Vol. 0. p. 219-242 244 p.

      Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    • 2009

      Cybercrime in Society

      Furnell, S., 2009, Connected minds, emerging cultures. Wheeler, S. (ed.). Vol. 0. p. 209-224 284 p.

      Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    • Securing the Human Factor

      Furnell, S., 1 Apr 2009, Understanding Public Perceptions: Trust and Engagement in ICT-Mediated Services. Cofta, P., Lacohée, H., Phippen, A. & Furnell, S. (eds.). Vol. 0. p. 171-190 250 p.

      Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    • 2008

      Malware

      Furnell, S. & Ward, J., 2008, Security and Software for Cybercafes. Vol. 0. p. 147-169

      Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    • Security Concepts, Services, and Threats

      Dowland, P. & Furnell, S., 30 Apr 2008, Securing information and communications systems. Furnell, S., Katsikas, S., Lopez, J. & Patel, A. (eds.). Vol. 0. p. 5-20 362 p.

      Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    • Security usability challenges for end-users

      Furnell, S., 30 Sept 2008, Social and Human Elements of Information Security. Gupta, M. & Sharman, R. (eds.). Vol. 0. p. 196-219 383 p.

      Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    • User Authentication Technologies

      Clarke, N., Dowland, P. & Furnell, S., 30 Apr 2008, Securing information and communications systems. Furnell, S., Katsikas, S., Lopez, J. & Patel, A. (eds.). Vol. 0. p. 35-59 362 p.

      Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    • 2006

      E-Commerce Security

      Furnell, S., 1 Jan 2006, Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues. Warkentin, M. & Vaughn, R. (eds.). Vol. 0. p. 131-149 18 p.

      Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    • Malware: An Evolving Threat

      Furnell, S. & Ward, J., 1 Jan 2006, Digital Crime and Forensic Science in Cyberspace. Kanellis, P., Kiountouzis, E., Kolokotronis, N. & Martakos, D. (eds.). Vol. 0. p. 28-54 26 p.

      Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    • 2005

      A Model for Managing and Migrating Web Resources

      Evans, M. & Furnell, S., 1 Jan 2005, Best Technology Practices in Higher Education.. Lloyd, L. (ed.). Vol. 0. p. 177-192 15 p.

      Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    • 2001

      Online Learning and Security

      Furnell, S. & Karweni, T., 1 Jan 2001, Towards the Virtual University: International On-Line Learning Perspectives. English, S., Nistor, N. & Wheeler, S. (eds.). Vol. 0.

      Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    Your message has successfully been sent.
    Your message was not sent due to an error.