Steven Furnell

Steven FurnellSteven Furnell is a professor of information security and leads the Centre for Security, Communications & Network Research at the University of Plymouth. He is also an Adjunct Professor with Edith Cowan University in Western Australia and an Honorary Professor with Nelson Mandela University in South Africa. His research interests include usability of security and privacy, security management and culture, and technologies for user authentication and intrusion detection. He has authored over 320 papers in refereed international journals and conference proceedings, as well as books including Cybercrime: Vandalizing the Information Society and Computer Insecurity: Risking the System. Prof. Furnell is the current Chair of Technical Committee 11 (security and privacy) within the International Federation for Information Processing, and a member of related working groups on security management, security education, and human aspects of security. He is also a board member of the Chartered Institute of Information Security and chairs the academic partnership committee and southwest branch.

Publications

A Holistic View of Cybersecurity Education Requirements
Steven M. Furnell, Ismini Vasileiou. © 2022. 19 pages.
This chapter sets the scene for the book as a whole, establishing the need for cybersecurity awareness, training, and education in order to enable us to understand and meet our...
Cybersecurity Education for Awareness and Compliance
Ismini Vasileiou, Steven Furnell. © 2019. 306 pages.
Understanding cybersecurity principles and practices is vital to all users of IT systems and services, and is particularly relevant in an organizational setting where the lack of...
A Holistic View of Cybersecurity Education Requirements
Steven M. Furnell, Ismini Vasileiou. © 2019. 18 pages.
This chapter sets the scene for the book as a whole, establishing the need for cybersecurity awareness, training, and education in order to enable us to understand and meet our...
Establishing a Personalized Information Security Culture
Shuhaili Talib, Nathan L. Clarke, Steven M. Furnell. © 2013. 17 pages.
Good security cannot be achieved through technical means alone and a solid understanding of the issues and how to protect one’s self is required from users. Whilst many...
An Expert Panel Approach on Developing a Unified System Authentication Benchmarking Index
Herbert J. Mattord, Yair Levy, Steven Furnell. © 2013. 11 pages.
Network-based applications still rely heavily on password-based authentication methods to control access. In a recent study, a benchmarking instrument was used to assess...
Preventative Actions for Enhancing Online Protection and Privacy
Steven Furnell, Rossouw von Solms, Andy Phippen. © 2012. 11 pages.
Many citizens rely upon online services, and it is certain that this reliance will increase in the future. However, they frequently lack a solid appreciation of the related...
Preventative Actions for Enhancing Online Protection and Privacy
Steven Furnell, Rossouw von Solms, Andy Phippen. © 2012. 11 pages.
Many citizens rely upon online services, and it is certain that this reliance will increase in the future. However, they frequently lack a solid appreciation of the related...
Establishing A Personalized Information Security Culture
Shuhaili Talib, Nathan L. Clarke, Steven M. Furnell. © 2011. 17 pages.
Good security cannot be achieved through technical means alone and a solid understanding of the issues and how to protect one’s self is required from users. Whilst many...
Preventative Actions for Enhancing Online Protection and Privacy
Steven Furnell, Rossouw von Solms, Andy Phippen. © 2011. 11 pages.
Many citizens rely upon online services, and it is certain that this reliance will increase in the future. However, they frequently lack a solid appreciation of the related...
Security Usability Challenges for End-Users
Steven Furnell. © 2009. 24 pages.
This chapter highlights the need for security solutions to be usable by their target audience, and examines the problems that can be faced when attempting to understand and use...
Malware: An Evolving Threat
Steven Furnell, Jeremy Ward. © 2008. 24 pages.
In the two decades since its first significant appearance, malware has become the most prominent and costly threat to modern IT systems. This chapter examines the nature of...
Malware: An Evolving Threat
Steven Furnell, Jeremy Ward. © 2008. 23 pages.
In the two decades since its first significant appearance, malware has become the most prominent and costly threat to modern IT systems. This chapter examines the nature of...
Malware: An Evolving Threat
Steven Furnell, Jeremy Ward. © 2006. 28 pages.
In the two decades since its first significant appearance, malware has become the most prominent and costly threat to modern IT systems. This chapter examines the nature of...
E-Commerce Security
Steven Furnell. © 2006. 19 pages.
This chapter considers the requirements for security in business-to-consumer e-commerce systems. Experience to date has revealed that these services are potentially vulnerable to...