Information security policy compliance model in organizations NS Safa, R Von Solms, S Furnell computers & security 56, 70-82, 2016 | 672 | 2016 |
Information security conscious care behaviour formation in organizations NS Safa, M Sookhak, R Von Solms, S Furnell, NA Ghani, T Herawan Computers & Security 53, 65-78, 2015 | 527 | 2015 |
Security implications of electronic commerce: a survey of consumers and businesses SM Furnell, T Karweni Internet research 9 (5), 372-382, 1999 | 434 | 1999 |
Authenticating mobile phone users using keystroke analysis NL Clarke, SM Furnell International journal of information security 6, 1-14, 2007 | 425 | 2007 |
Cybercrime: Vandalizing the information society S Furnell (No Title), 2002 | 366 | 2002 |
Surveying the development of biometric user authentication on mobile phones W Meng, DS Wong, S Furnell, J Zhou IEEE Communications Surveys & Tutorials 17 (3), 1268-1293, 2014 | 322 | 2014 |
Authentication of users on mobile telephones–A survey of attitudes and practices NL Clarke, SM Furnell Computers & Security 24 (7), 519-527, 2005 | 314 | 2005 |
Assessing the security perceptions of personal Internet users SM Furnell, P Bryant, AD Phippen Computers & Security 26 (5), 410-417, 2007 | 285 | 2007 |
Androdialysis: Analysis of android intent effectiveness in malware detection A Feizollah, NB Anuar, R Salleh, G Suarez-Tangil, S Furnell computers & security 65, 121-134, 2017 | 280 | 2017 |
A practical evaluation of Web analytics A Phippen, L Sheppard, S Furnell Internet Research 14 (4), 284-293, 2004 | 271 | 2004 |
Insider threat prediction tool: Evaluating the probability of IT misuse GB Magklaras, SM Furnell Computers & security 21 (1), 62-73, 2001 | 261 | 2001 |
Power to the people? The evolving recognition of human aspects of security S Furnell, N Clarke computers & security 31 (8), 983-988, 2012 | 228 | 2012 |
The challenges of understanding and using security: A survey of end-users SM Furnell, A Jusoh, D Katsabas Computers & Security 25 (1), 27-35, 2006 | 225 | 2006 |
Advanced user authentication for mobile devices NL Clarke, SM Furnell computers & security 26 (2), 109-119, 2007 | 222 | 2007 |
From culture to disobedience: Recognising the varying user acceptance of IT security S Furnell, KL Thomson Computer fraud & security 2009 (2), 5-10, 2009 | 197 | 2009 |
Computer hacking and cyber terrorism: The real threats in the new millennium? SM Furnell, MJ Warren Computers & Security 18 (1), 28-34, 1999 | 180 | 1999 |
Why users cannot use security S Furnell Computers & Security 24 (4), 274-279, 2005 | 177 | 2005 |
Authentication and supervision: A survey of user attitudes SM Furnell, PS Dowland, HM Illingworth, PL Reynolds Computers & Security 19 (6), 529-539, 2000 | 167 | 2000 |
An assessment of website password practices S Furnell Computers & Security 26 (7-8), 445-451, 2007 | 165 | 2007 |
An analysis of information security awareness within home and work environments S Talib, NL Clarke, SM Furnell 2010 International Conference on Availability, Reliability and Security, 196-203, 2010 | 160 | 2010 |