关注
Steven Furnell
Steven Furnell
在 nottingham.ac.uk 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Information security policy compliance model in organizations
NS Safa, R Von Solms, S Furnell
computers & security 56, 70-82, 2016
6192016
Information security conscious care behaviour formation in organizations
NS Safa, M Sookhak, R Von Solms, S Furnell, NA Ghani, T Herawan
Computers & Security 53, 65-78, 2015
4672015
Security implications of electronic commerce: a survey of consumers and businesses
SM Furnell, T Karweni
Internet research 9 (5), 372-382, 1999
4211999
Authenticating mobile phone users using keystroke analysis
NL Clarke, SM Furnell
International journal of information security 6, 1-14, 2007
4122007
Cybercrime: Vandalizing the information society
S Furnell
(No Title), 2002
3522002
Authentication of users on mobile telephones–A survey of attitudes and practices
NL Clarke, SM Furnell
Computers & Security 24 (7), 519-527, 2005
3102005
Surveying the development of biometric user authentication on mobile phones
W Meng, DS Wong, S Furnell, J Zhou
IEEE Communications Surveys & Tutorials 17 (3), 1268-1293, 2014
2942014
Assessing the security perceptions of personal Internet users
SM Furnell, P Bryant, AD Phippen
Computers & Security 26 (5), 410-417, 2007
2732007
A practical evaluation of Web analytics
A Phippen, L Sheppard, S Furnell
Internet Research 14 (4), 284-293, 2004
2592004
Insider threat prediction tool: Evaluating the probability of IT misuse
GB Magklaras, SM Furnell
Computers & security 21 (1), 62-73, 2001
2552001
Androdialysis: Analysis of android intent effectiveness in malware detection
A Feizollah, NB Anuar, R Salleh, G Suarez-Tangil, S Furnell
computers & security 65, 121-134, 2017
2502017
Advanced user authentication for mobile devices
NL Clarke, SM Furnell
computers & security 26 (2), 109-119, 2007
2242007
The challenges of understanding and using security: A survey of end-users
SM Furnell, A Jusoh, D Katsabas
Computers & Security 25 (1), 27-35, 2006
2212006
Power to the people? The evolving recognition of human aspects of security
S Furnell, N Clarke
computers & security 31 (8), 983-988, 2012
2082012
From culture to disobedience: Recognising the varying user acceptance of IT security
S Furnell, KL Thomson
Computer fraud & security 2009 (2), 5-10, 2009
1912009
Computer hacking and cyber terrorism: The real threats in the new millennium?
SM Furnell, MJ Warren
Computers & Security 18 (1), 28-34, 1999
1721999
Why users cannot use security
S Furnell
Computers & Security 24 (4), 274-279, 2005
1712005
Authentication and supervision: A survey of user attitudes
SM Furnell, PS Dowland, HM Illingworth, PL Reynolds
Computers & Security 19 (6), 529-539, 2000
1662000
A prototype tool for information security awareness and training
SM Furnell, M Gennatou, PS Dowland
Logistics Information Management 15 (5/6), 352-357, 2002
1572002
An assessment of website password practices
S Furnell
Computers & Security 26 (7-8), 445-451, 2007
1552007
系统目前无法执行此操作,请稍后再试。
文章 1–20