Professor Steve Furnell
Profiles

Professor Steve Furnell

Head of School

School of Computing, Electronics and Mathematics (Faculty of Science & Engineering)

Role

Head of School of Computing, Electronics and Mathematics
Leader of  Centre for Security, Communications & Network Research
Adjunct Professor, Edith Cowan University, Perth, Western Australia
Honorary Professor, Nelson Mandela Metropolitan University, South Africa

Qualifications

Chartered Information Technology Professional (CITP)

Chartered Engineer (CEng)

SEDA Accredited Teacher of Higher Education, University of Plymouth

PhD in information systems security, University of Plymouth

Professional membership

Fellow, British Computer Society
Senior Member, Institute of Electrical and Electronic Engineers
Fellow, Institute of Information Security Professionals (F.Inst.ISP)
Member, Association of Computing Machinery
Principal Fellow, Higher Education Academy

Roles on external bodies

Societies and international groups

  • UK national representative, Technical Committee 11 (Security and Privacy Protection in Information Processing Systems), International Federation for Information Processing (IFIP)
  • Board Member, Institute for Information Security Professionals
  • Chair, Institute for Information Security Professionals, South West Branch
  • Chair, IFIP Technical Committee 11 - Security and Privacy Protection in Information Processing Systems
  • Member, IFIP TC 11, Working Group 11.1 - Information Security Management
  • Member, IFIP TC 11, Working Group 11.8 - Information Security Education
  • Member, IFIF TC 11, Working Group 11.12 - Human Aspects of Information Security and Assurance

Editorships and Refereeing for Journals

  • Editor-in-Chief, Information and Computer Security
  • Associate Editor, Computers & Security
  • Associate Editor, Security and Communication Networks
  • Associate Editor, The Computer Journal
  • Associate Editor, Journal of Information Systems Security
  • Co-Editor, Journal of Information Warfare
  • Editorial Advisory Board, Internet Research
  • Editorial Advisory Board, Campus-Wide Information Systems
Other 
  • 2002-17, Chair, British Computer Society South West Branch
  • 2014-16, Member, Costs of Cyber Crime Working Group, UK Home Office.
  • 2013-15, Working Group Member, Dimension Three (Building Cyber Skills and Leadership) and Dimension Five (Controlling Risks Through Technology and Processes), Global Cyber Security Capacity Centre, Oxford Martin School, University of Oxford.

Teaching interests

Undergraduate

  • SEC101 Introduction to Computer Security
  • SEC102PP Cybersecurity Essentials*
  • SEC202 Secure Systems Architectures and Mechanisms
  • SEC301 Information Security Management and Governance*

Postgraduate

  • NET505 Computer Networks and Cybersecurity
  • SEC501 Information Security Management and Governance*

* denotes module leadership

Course development activity:

  • Co-Architect of BSc (Hons) Computer & Information Security (2007)
  • Architect of the MSc/MRes Information Systems Security (2003-04)
  • Co-Architect of the MSc/MRes Network Systems Engineering (2002-03)

Staff serving as external examiners

2016
  • Encouraging Employee Compliance with Information Security Policies in Cloud Computing in Hong Kong, Doctor of Business Administration thesis, University of Newcastle, Australia.
  • Passive video forgery detection using Frame correlation statistical features, Doctoral thesis, University of Malaya, Malaysia
  • Security Demands, Organisational and Personal Resources: A Stress-Based Security Compliance Model, PhD thesis, RMIT University, Australia.
  • A Hierarchical Group Key Management with Host Mobility Protocol in Wireless Mobile Environments, Doctoral thesis, University of Malaya, Malaysia.
  • A Critical Analysis of End-User Security Behaviour, PhD thesis, University of South Wales, UK.
2015
  • The development and evaluation of an InformationSecurity Awareness Capability Model: Linking ISO/IEC 27002 controls withAwareness Importance, Capability and Risk, PhD thesis, University of Southern Queensland, Australia.
  • MobiLeak: Security and Privacy of Personal Data inMobile Applications. PhD thesis, RoyalInstitute of Technology, Sweden.
  • A Biometric Security System Using Dorsal Hand Vein Patterns and Palmprints, PhD thesis, University of Mauritius, Mauritius.
  • Multi Provision Service based Internet charging Scheme, PhD thesis, University of Technology Sydney, Australia.
  • Exploring the Memorability of Multiple Recognition-Based Graphical Passwords and Their Resistance to Guessability Attacks, PhD thesis, University of Glasgow, UK.
2014
  • Information security risk management in Australian real estate sectors, PhD thesis, University of South Australia, Australia.
  • A Model to improved Smartphone Information Security Awareness, PhD thesis, University of Fort Hare, South Africa
  • A Noun-Based Approach to Support Location and Recency of Developers’ Activities for Improving Automatic Bug Assignment, PhD thesis, University of Malaya, Malaysia.
  • A Secure and Scalable Communication Framework for Inter-Cloud Services, PhD thesis, City University, UK.
  • On Methodologies to Select Systems for Automated Personal Identification, PhD thesis, Royal Holloway University of London, UK.
  • Secure Management of Multi-Application Mobile Platforms, PhD thesis, KTH Royal Institute of Technology, Sweden (assessed as Quality Reviewer, post-examination)
  • A Value Framework for Information and Communication Technology in South African Higher Education Institutions, PhD thesis, Nelson Mandela Metropolitan University, South Africa.
  • Energy-Efficient Data Security Schemes for Mobile Users in Cloud Environment, PhD thesis, University of Malaya, Malaysia.
2013
  • Trusted Channels and Roots of Trust in Distributed Embedded Systems, PhD thesis, Macquarie University, Australia.
  • An Exploration of the Factors Influencing Home Users’ Cybersecurity Behaviours, PhD thesis, Victoria University of Wellington, New Zealand.
  • Risk Analysis Using “Conflicting Incentives” as an Alternative Notion of Risk, PhD thesis, Gjovik University College, Norway.
  • An Ecologically Valid Evaluation of an Observation-Resilient Graphical Authentication Mechanism, PhD thesis, University of Glasgow, UK.
  • Investigating Information Systems Security Management Maturity for Small Medium Industries and Enterprises Electronic Commerce Using Technology, Organization and Enterprise Framework, PhD thesis, University of Malaya, Malaysia.
  • A method for analysing Value–Based Compliance in Information Systems Security, PhD thesis, Orebro University, Sweden.
  • Adaptable Middleware Framework for Interactive Services in Pervasive Computing, PhD thesis, Anna University, India.
  • Effective Online Privacy Mechanisms with Persuasive Communication, PhD thesis, Cranfield University, UK.
2012
  • A Baseline for Information Security Knowledge for End Users, MTech thesis, Nelson Mandela Metropolitan University, South Africa.
  • A Code of Conduct for Computer Forensic Investigators, Professional Doctorate, University of East London, UK.
  • An Examination of Information System Risk Perception Using the Repertory Grid Technique, PhD Thesis, University of Adelaide, Australia.
  • Security Awareness in Western Australian Online Banking Users of Phishing Attacks, Professional Doctorate, Edith Cowan University, Australia.
  • A Method for Securing Online Community Service: A Study of Selected Western Australian Councils, Professional Doctorate, Edith Cowan University, Australia.
  • A Framework for the development of a Personal Information Security Agent. MTech thesis, Nelson Mandela Metropolitan University, South Africa.
2011
  • Valuation and Reporting ofSecurity Assurance at Operational Systems Level, PhD thesis, University of East London, UK.
  • A Scalable, Distributed andSecure Position-based Routing Protocol for Ad-Hoc Networks, PhD thesis,University of Malaya, Malaysia.
  • Towards an InformationSecurity Framework for Government to Government: A Perspective from East Africa,PhD thesis, University of South Africa, South Africa.
  • Educating users aboutinformation security by means of game play, MTech thesis, Nelson MandelaMetropolitan University, South Africa.
  • A Model for Privacy-AwarePresence Management in Mobile Communications, PhD thesis, Nelson MandelaMetropolitan University, South Africa.
  • A Tactical Management Modelof Forensic Evidence Processes, PhD thesis, University of Western Australia.
2010
  • Analysis Avoidance Techniques of Malicious Software, PhD thesis, Edith Cowan University, Australia
  • Securing Home & Correspondent Registrations in Mobile IPv6 Networks, PhD thesis, University of Manchester, UK
  • Authentication in Health Services, PhD thesis, University of Oslo, Norway.
2009
  • Vulnerabilities in Class One Electronic Product Code Radio Frequency Identification Systems, PhD thesis, Edith Cowan University, Australia.
  • A Framework for Assessing Certification Schemes for IT Security Professionals, PhD thesis, Deakin University, Australia.
  • Network Firewalls Dynamic Performance Evaluation and Formalisation, PhD thesis, Napier University, UK.
  • E-Business Information Systems Security Design Paradigm and Model, Royal Holloway University of London, UK.
2008
  • Authentication and Privacy in Mobile Web Services, PhD thesis, City University, UK.
  • Enhancing Password based authentication by incorporating typing dynamics, MPhil to PhD transfer, University of Mauritius, Mauritius.
  • Cultivating and Assessing Information Security Culture, PhD thesis, University of Pretoria, South Africa.
  • A Systems Analysis Method for Online Teaching and Learning Systems, PhD thesis, Deakin University, Australia.
  • Assessing the Risk to Information Systems and Processes from Malicious Electromagnetic Threats – Through the Development of Diagnostic and Detection Techniques, PhD thesis, University of Glamorgan, UK.
  • Optimization in Multi-Agent Systems, PhD thesis, Cork Institute of Technology, Ireland.
  • Safeguarding Australia from Cyber-terrorism: A Proposed Cyber-terrorism SCADA Risk Framework for Australia, PhD Thesis, Monash University, Australia.

2007

  • On the Identification of Security Vulnerabilities, PhD thesis, Royal Holloway University of London, UK.
  • An investigation into information security in general medical practice, PhD thesis, Edith Cowan University, Australia.
  • An Approach Towards Standardising Vulnerability Categories, MSc by research, University of Pretoria, South Africa.
  • Usable Security Policies in Runtime Environments. PhD thesis, Linköping University, Sweden.
  • Masquerader Detection in Mobile Context based on Behaviour and Environment Monitoring. PhD thesis, University of Jyvaskyla, Finland.

2006

  • An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer Networks. PhD thesis, University of Surrey, UK.
  • Program Behaviour Modelling with Flexible Logical Entity Abstraction, PhD thesis, University of Ballarat, Australia.
  • Multi-Party Non-Repudiation Protocols and Applications, PhD thesis, University of Malaga, Spain.
  • Digital Forensic Evidence Collection by System Activity Logs, PhD thesis. University of Melbourne, Australia.
  • Towards a Framework for Corporate Information Governance, MTech dissertation, Nelson Mandela Metropolitan University, South Africa.

2005

  • Delegating Signing Power to Mobile Agents: Algorithm and Protocol Designs. PhD thesis. University of Manchester, UK.
  • The Australian Small to Medium Enterprise E-Business Security Methodology. PhD thesis. Deakin University, Australia
  • Changing the Way the World Thinks about Computer Security. PhD by publication. Middlesex University, London, UK.
  • An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer Networks. MPhil to PhD transfer, University of Surrey, UK.
  • A Simulation Study of Traffic Conditioner Performance. MSc by research. University of Pretoria, South Africa. 
  • Holistic Information Security Management Framework. Doctoral Thesis. Karlstad University, Sweden.
  • Intrusion Detection and Protection of Application Servers. Licentiate thesis. Chalmers University, Sweden.

2004

  • Secure and Distributed Multicast Address Allocation on IPv6 Networks. MSc by research. University of Pretoria, South Africa.
  • A Tool-kit for XML-based and process-oriented Application Integration. PhD thesis. Cork Institute of Technology, Ireland
  • Threats to Information Systems and Effective Countermeasures. PhD by publication. University of Glamorgan, UK
  • DiDDeM: A system for early detection of denial-of-service attacks. PhD thesis. Liverpool John Moores University, UK.
  • Protecting agents against malicious host attack. PhD thesis. Aston University, UK.
  • Comprehensive strategy on security of electronic networks. MPhil thesis. University of Bradford, UK.
  • Secure and Distributed Multicast Address Allocation on IPv6 Networks. Masters thesis. University of Pretoria, South Africa
  • A Tool-kit for XML-based and process-oriented Application Integration. PhD thesis. Cork Institute of Technology, Ireland
  • Threats to Information Systems and Effective Countermeasures. PhD by publication. University of Glamorgan, UK
  • DiDDeM: A system for early detection of denial-of-service attacks. PhD thesis. Liverpool John Moores University, UK.
  • Protecting agents against malicious host attack. PhD thesis. Aston University, UK.
  • Comprehensive strategy on security of electronic networks. MPhil thesis. University of Bradford, UK.
  • NeGPAIM: A model for the proactive detection of information security intrusions. PhD thesis. Port Elizabeth Technikon (South Africa)

2003

  • Inferential analysis of incomplete audit data sets. PhD thesis. University of Glamorgan, UK.
  • Interactive Generation of Uniformly Random Samples of World Wide Web Pages. MSc by Research thesis. Kingston University, UK.
  • Enterprise IT Security Data Model and security of the Internet. MPhil thesis. Coventry University, UK.

2002

  • Distributed Failure Restoration for ATM Tactical Communication Networks. Ph.D. thesis. De Montfort University, UK.
  • An Anomaly Intrusion Detection System Based on Intelligent User Recognition. Ph.D. thesis. University of Jyvaskyla, Finland.
  • The evolving nature of fraud investigation and prevention. Ph.D. thesis. Deakin University, Australia.

2001

  • Design and Implementation of an Intranet-Solution especially with Workflow Aspects. M.Sc. research thesis. Cork Institute of Technology, Ireland.

2000

  • Methods for Intelligent User Recognition Based on Machine Learning Techniques in Anomaly Intrusion Detection. Licentiate thesis. University of Jyvaskyla, Finland.
  • Human-Computer Interaction via Telephone. M.Sc. research thesis. Cork Institute of Technology, Ireland.
  • Software Component Reuse by Adaptation. Ph.D. thesis. Cork Institute of Technology, Ireland.

 

Research interests

  • Cyber Security / IT Security, including user authentication, biometrics, cyber crime, intrusion detection and response, security management and culture, usable security
  • Internet Technologies and Applications
  • Mobility

Research degrees awarded to supervised students

As Director of Studies 

2015    Authentication Aura: A cooperative and distributed approach to user authentication on mobile devices

2015    Establishment of information security awareness and culture

2013    The perspective of usability and perception in information security

2013    The aggressive detection of network intrusions

2012    Multi-Dimensional Personalisation for the online and offline world

2012    Enhancing Automated Intrusion Response Systems

2011    AnInsider Misuse Threat Detection and Prediction Language

2011    Behavioural profiling in mobile networks 

2011    A Study of Graphical Alternatives for User Authentication

2010    Improving Intrusion Prevention, Detection and Response

2008    Profiling methods for computer crime and abuse*

2007    A Generic Architecture for Insider Misuse Monitoring in IT Systems

2007    Two-Tier Intrusion Detection System for Mobile Ad hoc Networks

2007    Effective information assurance with risk management

2006    Active security vulnerability identification and resolution

2006    Non-Intrusive Subscriber Authentication for Next Generation Mobile Communication Systems

2004    A generic architecture for intrusion specification & misuse detection in IT systems*

2004    Classifying and responding to network intrusions

2004    Enhancing subscriber security for mobile phones using biometrics

2004    User authentication and supervision in networked systems

2001    A model for managing information flow on the World Wide Web

2000    Flexible, composite multimedia medical record system for healthcare establishments

As Supervisor

2016    Automated Digital Forensics and Computer Crime Profiling

2016    Opportunities and Risks in Online Gaming Environments

2016    Graphical One-Time-Password Authentication

2014    Sustainability Reporting Process Model using Business Intelligence

2014    IT Governance in the Health Care Sector

2014    Non-Intrusive Continuous User Authentication for Mobile Devices

2014    Continuous User Authentication Using Multi-Modal Biometrics

2012    A Holistic Approach to Information Security Culture

2011    Anomaly-BasedCorrelation of IDS Alarms

2010    Internet Marketing for Profit Organisations: A Framework for the implementation of Strategic Internet Marketing

2007    SecurityPolicy Enforcement in Application Environments using Distributed Script-based Control Structures

2007    The social and psychological impact of SMS text messaging

2007    Dynamic Adaptation of Streamed Real-Time E-Learning Videos over the Internet

2004    Integrated multimedia communications for IP networks

2004    Performance characterisation of IP networks

2003    A Correlation Framework for Continuous User Authentication Using Data Mining

2002    A Generic Network and System Management Framework

2002    Security in a Distributed Processing Environment

2001    Component architectures and their impact upon software development

 

As of January 2017:

  • 98 refereed journal papers
  • 61 other journal papers
  • 188 refereed conference papers
  • 44 authored/edited books
  • 18 book chapters
  • 46 other published outputs.

For full details, please see the publication list on my research centre website. 

Publications from 2014 onwards are listed below.

Refereed papers in journals

  1. A.Feizollaha, N.B.Anuar, R.Salleh, G.Suarez-Tangil and S.Furnell. 2017. “AndroDialysis:Analysis of Android Intent Effectiveness in Malware Detection”, Computers & Security, vol. 65, March2017, pp121-134.
  2. M.Al Fahdi, N.L.Clarke, F.Li and S.M.Furnell. 2016. “A Suspect-Oriented Intelligent and AutomatedComputer Forensic Analysis”, DigitalInvestigation, 18, pp65-76.
  3. T.Alotaibi and S.Furnell.2016. “Assessing Staff Acceptance andCompliance with Information Security”, InternationalJournal of Computing Academic Research (IJCAR), vol. 5, no.4, pp195-201.
  4. S.Alotaibi, S.Furnell,and N.Clarke. 2016. “A Novel Taxonomy for Mobile Applications Data”, International Journal of Cyber-Security andDigital Forensics, vol. 5, no. 3, pp115-121.
  5. H.Alsaiari,M.Papadaki, P.Dowland and S.Furnell.2016. “Graphical One-Time Password (GOTPass): A Usability Evaluation” Information Security Journal: A GlobalPerspective, vol. 25. Issue 1-3, pp94-108.
  6. S.Alqahtany, N.Clarke, S.Furnelland C.Reich. 2016. “A ForensicAcquisition and Analysis System for IaaS”, ClusterComputing, vol. 19, issue. 1, pp439-453.
  7. N.Sohrabi Safa, R.von Solms and S.Furnell. 2016. “Informationsecurity policy compliance model in organizations”, Computers & Security, 56, pp70-82.
  8. H.Alsaiari,M.Papadaki, P.Dowland and S.Furnell.2015. “Secure Graphical One Time Password (GOTPass): An Empirical Study”, Information Security Journal: A GlobalPerspective, vol. 24, issue 4-6, pp207-220.
  9. S.Alotaibi, S.Furnell,and N.Clarke. 2015. “A Fine-Grained Analysis of User Activity on MobileApplications: The Sensitivity Level Perception”, International Journal for Information Security Research, vol. 5,no. 3, pp591-599.
  10. M.Ouedraogo, S.Mignon,H.Cholez, E.Dubois and S.Furnell.2015. “Security Transparency: The Next Frontier for Security Research in theCloud”, Journal of Cloud Computing:Advances, Systems and Applications, vol. 4, no. 12.
  11. E.Sheriff and S.Furnell. 2015. “A Conceptual Modelfor Cultivating an Information Security Culture”, International Journal for Information Security Research, vol. 5,no. 2, pp565-573.
  12. H.Saevanee, N.Clarke and S.Furnell. 2015. “Continuous userauthentication using multi-modal biometrics", Computers& Security, 53, pp234-246.
  13. N.SohrabiSafa, M.Sookhak, R. Von Solms, S.Furnell,N.A.Ghani, T.Herawan. 2015. “Information Security Conscious Care BehaviourFormation in Organizations”, Computers& Security, 53, pp65-78.
  14. N.H.Abd Rahim,S.Hamid, L.Mat Kiah, S.Shamshirband and S.Furnell.2015. “A systematic review of approaches to assessing cybersecurity awareness”,Kybernetes, vol. 44, iss. 4, pp606-622.
  15. A.Akhunzada,M.Sookhak; N.B.Anuar, A.Gani, E.Ahmed, M.Shiraz, S.Furnell, A.Hayat and M.K.Khan. 2015. “Man-At-The-End Attacks:Analysis, Taxonomy, Human Aspects, Motivation and Future Directions”, Journal of Network and Computer Applications,vol. 48, February 2015, pp44-57.
  16. W.Meng,D.S.Wong, S.Furnell and J.Zhou.2015. “Surveying the Development of Biometric User Authentication on MobilePhones”, IEEE Communications Surveys andTutorials, vol. 17, no. 3, pp. 1268 – 1293.
  17. M.A.Harris, S.Furnell and K.Patten. 2014.“Comparing the Mobile Device Security Behavior of College Students andInformation Technology Professionals”, Journalof Information Privacy and Security, vol. 10, no. 4, pp186-202.
  18. E.Kaspersky andS.Furnell. 2014. “A securityeducation Q&A”, InformationManagement and Computer Security, vol. 22, no. 2, pp130-133.
  19. H.J.Mattord, Y.Levyand S.Furnell. 2014. “Factors forMeasuring Password-Based Authentication Practices”, Journal of Information Privacy and Security, vol. 10, no. 2, 71-94,DOI: 10.1080/15536548.2014.924812.
  20. S.Shamshirband,A.Amini, N.B.Anuar, L. Mat Kiah, T.Ying Wah and S.Furnell. 2014. “D-FICCA: A Density-based Fuzzy ImperialistCompetitive Clustering Algorithm for Intrusion Detection in Wireless SensorNetworks”, Measurement, vol. 55,pp212-226.
  21. M.Z.Jali, S.M.Furnell and P.S.Dowland. 2014. “Investigatingthe Viability of Multifactor Graphical Passwords for User Authentication”, Information Security Journal: A Global Perspective, vol. 23, issue 1-2,pp10-21.

Other journal outputs

  1. S.Furnell and R.Esmael. 2017. “Evaluating the effect of guidance and feedback upon password compliance”,Computer Fraud & Security, January 2017, pp5-10
  2. S.Furnell. 2016. “The usability of security - revisited”, Computer Fraud & Security, September 2016, pp5-11.
  3. S.Furnell. 2016. “Vulnerability management: not a patch on where we should be?”, Network Security, April 2016, pp5-9.
  4. S.Furnell, D.Emm and M.Papadaki. 2015. “The challenge of measuring cyber-dependent crimes”, October 2015, pp5-12.
  5. S.Furnell. 2015. “Managing privacy settings: Lots of options, but beyond control?”, Computer Fraud & Security, April 2015, pp8-13.
  6. S.Furnell. 2014. “Password practices on leading websites – revisited”, Computer Fraud & Security, December 2014, pp5-11.
  7. S.Furnell, J.van Niekerk and N.Clarke. 2014. “The Price of Patching”, Computer Fraud & Security, August 2014, pp8-13.
  8. S.Furnell and L.Moore. 2014. “Security literacy: the missing link in today’s online society?”, Computer Fraud & Security, May 2014, pp12-18.
  9. S.Furnell and N.Clarke. 2014. “Biometrics: making the mainstream”, Biometric Technology Today, January 2014, pp5-9.

Refereed conference contributions     

  1. N.Clarke, F.Li, A.Alruban and S.Furnell. 2017. ”Insider Misuse Identification using Transparent Biometrics”, in Proceedings of the 50th Hawaii International Conference on System Sciences (HICSS-50), Hilton Waikoloa Village, Hawaii, 4-7 January 2017, pp4031-4040.
  2. M.Alotaibi, S.Furnell and N.Clarke. 2016. " Information Security Policies: A review of Challenges and Influencing Factors", in Proceedings of the 11th International Conference for Internet Technology and Secured Transactions (ICITST-2016), Barcelona, Spain, 5-7 December 2016, pp352-358.
  3. G.Alotibi, N.Clarke, F.Fudong and S.Furnell. 2016. “User Profiling from Network Traffic via Novel Application-Level Interactions”, in Proceedings of the 11th International Conference for Internet Technology and Secured Transactions (ICITST-2016), Barcelona, Spain, 5-7 December 2016, pp279-285.
  4. F.Alotaibi, S.Furnell, I.Stengel and M.Papadaki. 2016. “A Survey of Cyber Security Awareness in Saudi Arabia”, in Proceedings of the 11th International Conference for Internet Technology and Secured Transactions (ICITST-2016), Barcelona, Spain, 5-7 December 2016, pp154-158.
  5. S.Alqahtany, N.Clarke, S.Furnell and C.Reich. 2016. “A Forensic Acquisition and Analysis System for IaaS: Architectural Model and Experiment”, Proceedings of 11th International Conference on Availability, Reliability and Security (ARES 2016), Salzburg, Austria, 31 August – 2 September 2016.
  6. A.Alruban, N.L.Clarke, F.Li and S.M.Furnell. 2016. “Proactive Biometric-Enabled Forensic Imprinting”, International Conference on Cyber Incident Response, Coordination, Containment & Control (Cyber Incident 2016), June 13-14, London, UK, 2016.
  7. N.L.Clarke, F.Li, S.M.Furnell, I.Stengel I and G.Ganis. 2016. “Information Security and Practice: The User's Perspective”, Proceedings of the 11th International Conference On Cyber Warfare and Security (ICCWS-2016), Boston, USA, 17-18 March 2016, pp81-89.
  8. R.B.Batie,Y.Levy, S.Furnell and P.Liu. 2015. Improving User Authentication with Fingerprint Biometrics and Biometric Personal Identification Number (BIO-PINTM) as a Multi-Factor Authentication Mechanism”, to appear in Proceedings of Workshop on Information Security and Privacy (WISP), Fort Worth, Texas, 13December 2015.
  9. M.Alotaibi, S.Furnell and N.Clarke. 2015. “Towards Dynamic Adaption of User’s Organisational Information Security Behaviour”, 2015 SRI Security Congress, Perth, Australia, 30 November - 2 December 2015.
  10. S.N.Alotaibi, S.Furnell and N.Clarke. 2015. "Transparent Authentication Systems for Mobile Device Security: A Review", 10th International Conference for Internet Technology and Secured Transactions (ICITST-2015), London, UK
  11. S.Furnell and L.Moore. 2014. “End-user security: No longer a matter of choice?”, Proceedings of the 13th Annual Security Conference, Las Vegas, Nevada, 21-23 May 2014.
  12. S.Furnell and B.Mushens. 2014. “Using iPads to enable cultural change in Technology Enhanced Learning: A case study”, ihe 2014: 1st International Conference on the use of iPads in Higher Education, Paphos, Cyprus, 20-22 March 2014. 

Edited books

  1. W.Meng, X.Luo, S.Furnell and J.Zhou. 2017. Protecting Mobile Networks and Devices. CRC Press. ISBN 978-1-4987-3583-4. 319pp.
  2. Katsikas, S., Lambrinoudakis, C, and Furnell, S. 2016. Trust, Privacy and Security in Digital Business - 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings. Lecture Notes in Computer Science 9830, Springer, ISBN 978-3-319-44340-9.123pp.
  3. Furnell, S.M. and Clarke, N.L. 2015. Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2015), Lesvos,Greece, July 1-3, ISBN 978-1-84102-388-5, 295pp.
  4. Clarke, N.L and Furnell, S.M. 2016. Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016), Frankfurt, Germany, July 19-21, ISBN 978-1-84102-413-4, 313pp.
  5. Clarke, N.L and Furnell, S.M. 2014. Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2014). Plymouth,8-10 July, ISBN 978-1-84102-375-5, 239pp.
  6. Dowland, P.S, Furnell, S.M and Ghita, B.V. 2014. Proceedings of the Tenth International Network Conference (INC 2014), Plymouth, 8-10 July 2014, ISBN978-1-84102-373-1, 197pp.

Chapters in books

  1. S.Furnell. 2016. “The Evolving Landscape of Technology-Dependent Crime”, in The Routledge Handbook of Technology, Crime and Justice.  M.R.McGuire and T.J.Holt (Eds), Routledge International Handbooks.

Other published output

  1. S.Furnell. 2017. “Understanding Cyber Security Skills - a framework for clarity”, IISP Pulse, Issue 24, Winter 2017, p16-17.
  2. S.Furnell. 2016. “Suffering Security Lag?”, InfoSecurity, vol. 13, no. 1, pp29-30.
  3. S.Furnell. 2016. “Getting more for less: Reflecting on the numbers in the IT revolution”, Significance, 12 January 2016.
  4. S.Furnell. 2015. “Cybersecurity – Skills for the masses”, IISP Pulse, Issue 19, Summer 2015, p24-25.

Reports & invited lectures

Invited Lectures, Panels and Keynotes

  • “Not quite dead yet: password authentication revisited”, Panel discussion, 50th Hawaii International Conference on System Sciences (HICSS-50), Hilton Waikoloa Village, Hawaii, 5 January 2017
  • “Careering towards a secure future?”, IISP Cyber Career Development Event, London, 25 November 2016.
  • “Usable Security: Getting better by design?”, Keynote speaker, Sixteenth International Crisis Management Workshop (CriM’16), Oulu, Finland, 2 November 2016.
  • “BYOD: Their Device, Your Problem?”, Mobile Working and Device Management in the Public Sector Conference, Salford, UK, 1 November 2016.
  • “Vulnerability management: Not a patch on where we should be?”, Invited talk, Lancaster University, 30 June 2016.
  • “Mobile device security: Providing protection where the user meets the network”, invited talk, 2016 European Future of Wireless Technology Workshop, Stockholm, Sweden, 14 June 2016.
  • “User Authentication – Knowing, Having and Being”, Guest lecture, University of Piraeus, Greece, 16 May 2016. 
  • “The First 72 Hours - Dealing with the Crucial Time in Incident Response”, Invited panellist, InfoSecurity Magazine Webinar, 28 April 2016.
  • “Addressing the Security Challenges Presented by Mobile Technology”, Keynote Presentation, Realising the Benefits of Mobile Technology and Learning in Higher and Further Education Forum, London, UK, 14 April 2016.
  • “Cybersecurity – What’s in a name?”, Panel Chair, 15th Annual Security Conference, Las Vegas, 29 March 2016.
  • “Why are we so emotional in security?!”, invited panel chair, CRESTCon and IISP Congress 2016, Royal College of Surgeons, London, 10 March 2016.
  • “Usable Security”, Guest lecture, University of Kent, 26 January 2016.
  • “Assessing current & future threats“, Invited Discussant, CERRE Expert Workshop – Cybersecurity: Safeguarding Europe’s Essential Infrastructure, Brussels, Belgium, 19 November 2015.
  • “Securing the i-Society”, Keynote presentation, IEEE i-Society 2015, London, UK, 9 November 2015.
  • Invited event chair, 5th Annual Payments Conference 2015, London, UK, 22 October 2015.
  • “Educating Towards Cyber Security Professionalism”, Invited speaker, 4th International Conference on Cyber Security and Education, Alloa, Scotland, 16 October 2015.
  • “Controlling Privacy – User expectations versus usability”, Invited speaker, CriM15 / Oulu Winter School, Oulu, Finland, 13 October 2015.
  • “How to Articulate Risk to Senior Management”, Invited panelist, InfoSecurity Magazine Fall Virtual Conference - North America, 30 September 2015.
  • “Mobile devices, immobile security?”, Keynote presentation, 9th International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST 2015), Cambridge, UK, 10 September 2015.
  • “Addressing the Security Risks of Negligent Insiders”, Invited panellist, InfoSecurity Magazine Webinar, 31 July 2015.
  • “Mobile Device Security – Whose Device? Whose Data? Whose Problem?”, Special Keynote Presentation, Maximising Mobile Technology and Learning Forum, London, UK, 8 July 2015. 
  • “Creating a Company-Wide Information Security Culture”, Invited panellist, InfoSecurity Magazine Webinar, 19 June 2015.
  • “Getting the measure of cybercrime?”, invited talk, University of Oxford, 5 June 2015.
  • “Building national cybersecurity workforces”, invited panellist, 9th IFIP WG 11.8 World Conference (WISE 9). Hamburg, Germany, 26 May 2015.
  • “Security and Privacy – All under control?”, Guest talk, 14th Annual Security Conference, Las Vegas, 19 May 2015.
  • “Examining the Security Experience”, invited talk, Birmingham City University, Birmingham, UK, 7 May 2015.
  • “Biometric Authentication: Feasibility and Fallout”, invited talk, PAY-SEC Payment Security Summit, London, UK, 21 April 2015.
  • “Mobile biometrics: Who you are, wherever you go”, invited talk, European Biometrics Symposium, Teddington, UK, 25 February 2015.
  • “From Passwords to Biometrics: In Pursuit of a Panacea”, Keynote Presentation, 1st International Conference on Information Systems Security and Privacy (ICISSP 2015), Angers, France, 9-11 February 2015.
  • “Privacy and Trust in Digital Societies”, Invited panelist, 1st International Conference on Information Systems Security and Privacy (ICISSP 2015), Angers, France, 9-11 February 2015.
  • “Spotlight on mobile technology: Utilising and integrating to improve teaching and learning”, Invited panellist, Bett 2015, London, UK, 22 January 2015.
  • “Safeguarding Devices and Data - Reinforcing the Need for Security In Mobile Learning”, Special Keynote Presentation, Transforming Further and Higher Education Through Mobile and Technology Enhanced Learning, London, UK, 9 December 2014.
  • “Mobile Security: The Challenge of Liberation”, Keynote Presentation, International Conference for Internet Technology and Secured Transactions (ICITST-2014), London, UK, 8 December 2014.
  • Invited event chair, 4th Annual Payments Conference 2014, London, UK, 6 November 2014.
  • “In Defence of the Password”, invited talk, Public Research Centre Henri Tudor, Luxembourg, 22 October 2014.
  • “Cyber Security: Can we keep up?”, Guest lecture, European Council of Georgia Study Abroad Program, London, 14 July 2014.
  • Invited event chair, 2nd Annual Omnichannel Banking Conference 2014, London, UK, 19 June 2014.
  • “Ensuring Security within Mobile Learning Strategies: Safeguarding Data and Devices”, invited presentation, Mobile Learning 2014: Transforming the Delivery of Further and Higher Education, London, UK,18 June 2014.
  • “How to develop a strong authentication strategy to enhance security, business performance and user experience”, Invited panellist, Infosecurity Magazine Summer Virtual Conference 2014, 17 June 2014.
  • “Flexible and Non-Intrusive Authentication”, invited presentation, Cloud Computing Security and Identity Workshop National Museum of Computing, Bletchley, UK, 3-4 April 2014.
  • Invited track chair, Technology Innovation Track, The 11th Annual Retail Fraud Conference 2014, London, 2 April 2014.
  • “Ensuring our Digital Security”, invited presentation, Employability for the Digital Age, British Council, Johor Bahru, Malaysia, 26 March 2014.
  • “Bitcoin and other Crypto-currencies – Will they thrive once regulated?”, Panel session, Kaspersky Academy CyberSecurity for the Next Generation – Asia-Pacific and MEA, Seoul, South Korea, 12 March 2014.
  • “Biometrics: A Triumph of Convenience over Security?”, invited presentation, Kaspersky Academy CyberSecurity for the Next Generation – Asia-Pacific and MEA, Seoul, South Korea, 12 March 2014.
  • ”Your Device - Everybody’s Problem?”, HEA Changing the Learning Landscape – Bring your Own Device conference, University of Southampton, 7 March 2014.
  • “Recognising and Responding to Mobile Device Threats”, International Islamic University Malaysia, Kuala Lumpur, 20 February 2014.
  • “Cyber Security: Power to the People?”, IET Devon and Cornwall Cyber Security event, Plymouth University, 29 November 2013.
  • “Convenient to Carry, Difficult to Defend: The Security Challenge of Smartphones and Tablets”, Invited webcast, BrightTALK Application Security Summit, 12 November 2013.
  • “Making Security Tolerable”, University of Malaya, Kuala Lumpur, 1 November 2013.
  • Invited event chair, Payments Conference 2013, London, UK, 30 October 2013.
  • “Are we finally getting past passwords“, Orebro University, Sweden, 15 May 2013.
  • “More than just technology hype: recognising the Big Risk of Big Data”, Panel Chair, Telco Cloud World Forum, London, 17 April 2013.
  • “Vulnerability Management – The Never-Ending Story”, Invited webcast, BrightTALK Application Security Summit, 17 April 2013.
  • “Can we keep up with the Cyber Arms Race?”, Panel session, Kaspersky Lab Asia Pacific & MEA Cup 2013, Singapore, 22 March 2013.
  • “2020 Vision: Enabling and Securing the Enterprise of the Future”, Invited panellist, Infosecurity Webinar, 19 February 2013.
  • “Is Security Awareness a Waste of Time?”, Invited panellist, Infosecurity Webinar, 24 January 2013.
  • “Infosec: Lots of safeguards and no protection?”, Keynote presentation, secau Security Congress, Perth, Western Australia, 5 December 2012.
  • “Delivering OERs to an international audience via iTunes U”, invited presentation, Opening up: New horizons and institutional strategies, London, 4 October 2012.
  • “My mobile device is jailbroken - will you secure it?”, Invited panellist, Infosecurity UK Virtual Conference, 27 September, 2012.
  • “Next-Generation Threats: Old Problems in a New Guise?”, Invited webcast, BrightTALK Next-Generation Threat Protection Summit, 5 September 2012.
  • “iTunes U”, Invited presentation, Apple Executive Briefing Center, London, 24 August 2012.
  • “The Long Shadow of Cyber Crime”, Webinar Panel, Business Tech Debate, Financial Times, London, 16 August 2012.
  • “Cyber Security for SMBs”, Webinar Panel, Kaspersky Lab, London, 28 June 2012.
  • “Mobile Malware:  Finally hitting the moving target?”, Invited webcast, BrightTALK Hackers and Threats Summit, 21 June 2012.
  • Invited event co-chair, Secure Information Conference 2012, London, UK, 15 March 2012.
  • “Phishing deeper: An increasing threat in the evolving Web”, Invited webcast, BrightTALK Web 2.0 Security Summit, 8 February 2012.
  • “New Approaches to New Dangers”, Panel session, Kaspersky Lab US Cup 2011, New York, United States, 10 November 2011.
  • “21st Century Threats Facing End-Users”, Keynote presentation, Information Security South Africa (ISSA) 2011, Johannesburg, South Africa, 15 August 2011.
  • “Are We High In The Clouds?”, Panel session, Kaspersky Lab International Cup 2011, Munich, Germany, 15 April 2011.
  • “Beyond Security Awareness: Achieving culture and avoiding fatigue”, Keynote presentation, Security Forum 2011, Hagenberg, Austria, 6 April 2011.
  • “Usable Security: Can it be too easy?”, University of Kent, 22 March 2011.
  • “Single Sign On: Convenience or Risk?”, Invited Online Panel, BrightTALK Web 2.0 Security Summit, 16 March 2011.
  • “Preparing for the future Internet: IT-Security in a connected world”, Panel session, Kaspersky Lab Asia Pacific & MEA Cup 2011, Shah Alam, Selangor, Malaysia, 5 March 2011.
  • “Meeting new demands for user authentication”, Invited webcast, BrightTALK Authentication Summit, 7 October 2010.
  • “Getting tricky: The many faces of social engineering”, Symposium on Security and Cybercrime: Vision and Foresight, Edinburgh, UK, 25 June 2010.
  • “Security and Usability: Where technology meets the people”, Khalifa University of Science, Technology and Research, Sharjah, UAE, 14 June 2010. 
  • “The threat on the net: Attacking technology 
  • and those who need”, Invited Speaker, Critical National Infrastructure Protection Workshop (CNIP2010), Mumbai, India, 15 May 2010.
  • “Online identity and authentication: The varying degree of being me”, Invited webcast, BrightTALK Identity and Access Management Summit, 6 May 2010.
  • “Essential Mobile Data Security: Keeping data safe and accessible for mobile workers”, Invited Speaker, Public Sector Mobile and Flexible Working: Achieving Real Efficiencies, Birmingham, UK, 25 February 2010.
  • “The Irreversible March of Technology”, Invited Speaker, Human Factors in Information Security Conference, London, UK, 23 February 2010.
  • “Securing mobile devices: Concepts, policies and technologies”, Middlesex University, 29 January 2010.
  • “Usability of Security”, University of Piraeus, Greece, 18 December 2009. 
  • “Protecting your network from portable devices”, Invited webcast, BrightTALK Endpoint Security Summit, 8 December 2009.
  • “Are we really Managing the Threat“, Expert Panel, 2009SECAU Security Congress, Perth, Western Australia, 3 December 2009.
  • "Going, going, gone?  The challenges of mobile security", Invited Speaker, International Conference on Information Security and Digital Forensics 2009, City University, London, 8 September 2009. 
  •  “Global Cyber Threats”, Invited seminar, University College London, 22 June 2009.
  • “Protected or Perplexed?  The challenge of usable security”, Invited talk, IT-security for the new generation, Kaspersky Lab, Moscow, 29 April 2009.
  • “Effective Peer Strategies”, Invited speaker, Safeguarding Cyberworld Conference, Plymouth, UK, 10 February 2009.
  • “Enhancing User Authentication for Mobile Devices“, Invited talk, INDIA-SIM 2009, Bangalore, India, 22-23 January 2009.
  • “Social Engineering: Exploiting the Weakest Links”, University of Portsmouth, 16 January 2009.
  • “Web 3.0: Third time lucky for e-Safety and Security”, Invited speaker, South West Grid for Learning eSafety Conferences, Torquay, Bristol and Bournemouth, 25-27 November 2008.
  • “Cybercrime: Hackers, Malware and other online threats”, Keynote Lecture, IT-Speicher, Regensburg, Germany, 24 July 2008.
  • “Securing the end-user: What they know and what they do”, Keynote Lecture, Third International Conference on Usability Engineering, University of Oviedo, Spain, 20 May 2008.
  • “Cybercrime: A Clear and Present Danger”, University of Exeter, 13 May 2008.
  • “Keystroke dynamics: An authentication enhancement for mobile devices”, Gjøvik University College, Gjøvik, Norway, 31 January 2008.
  • “Combating Identity Theft: Recognising contributors to the problem”, Invited speaker, Net Focus UK 2007, Southampton, 2 October 2007.
  • “How Do You Secure Mobile Devices in a World Where Data Leakage is Pervasive”, Invited workshop moderator, Net Focus UK 2007, Southampton, 2 October 2007.
  • “Cybercrime: The continuing threat”, University of Exeter, 18 May 2007.
  • “Are You Even Remotely Secure? The Mobile Device Dilemma”, Keynote Panel presentation, Infosecurity Europe 2007, Olympia, London, 25 April 2007.
  • “Usability Challenge - Why users can’t use security”, Aston University, 1 November 2006.
  • “Managing the security of information assets”, Managing Information Throughout the Organisation Conference, Guernsey, 13 September 2006.
  • Invited panellist, Security Panel. Mobility Summit 2006, London, 4 July 2006.
  • “Protected or confused: Assessing whether end-users can understand and use security”, Invited speaker, End Point Security 2006, London, 28 June 2006.
  •  “Cybercrime and investigation”, University of Exeter, 10 May 2006.
  • “Mitigating the Enemy Within”, Keynote Panel presentation, Infosecurity Europe 2006, Olympia, London, 25 April 2006.
  • “Continuous user identify verification using keystroke analysis”, BCS SGAI Symposium/Colloquium on Intelligence in Security and Forensic Computing, Edinburgh, 3 April 2006.
  • “The Challenge of Usable IT Security”, Keynote presentation, Usability Engineering, University of Oviedo, Spain, 23-24 March 2006.
  • “The way forward – Where to from here?”, Expert Panel, 1st Colloquium for Information Systems Security Education – Asia Pacific, Adelaide, Australia, 22 November 2005.
  • “Hitting easy targets: The Internet threats facing end-users”, University of Malaga, Spain, 28 October 2005.
  • “Internet insecurity: Who's trying to spoil your day today?”, Keynote presentation at ITA 2005 - International conference on Internet Technologies and Applications, Wrexham, North Wales, 8 September 2005.
  • “Fostering the usability of information security solutions“, APEC-OECD Workshop on the Security of Information Systems and Networks, Seoul, Korea, 6 September 2005.
  • “Educating And Raising Awareness Of Governance Company Wide”, Keynote Panel, Infosecurity Europe 2005, Olympia, London, 26 April 2005.
  • “Get patched or get punched: Plugging the security holes before the attackers hit you”, British Computer Society (Northampton Branch), 8 March 2005.
  • “The requirements and challenges of automated intrusion response”, University of Birmingham, 20 January 2005.
  • “Enemies within?: Managing the problem of insider attacks and misuse”, Keynote presentation at InfoSec 2004, Fremantle, Western Australia, 26th November 2004.
  • “Cyber Parasites: The ongoing march of malware”, Australian Institute of Professional Intelligence Officers, Perth, Western Australia, 19th November 2004.
  • “Malware Evolution: The arrival of the true computer parasite?”, University of Wales, Wrexham, 3 November 2004.
  • “Biometric user authentication using keystroke dynamics”, University of Bristol, 2 November 2004.
  •  “Cyber Threats: What are the issues and who sets the agenda?”, 5th International Relations Conference, The Hague, The Netherlands, 9-11 September 2004.
  • “The Darker Side of Innovation”, Expert Panel, 7th Working Conference on IT Innovation for Adaptability and Competitiveness, Leixlip, Ireland, 30 May-2 June 2004.
  • “E-commerce Security: Getting Consumers to Trust the Net”, Keynote Presentation, IV Jornadas Internacionales sobre comercio electronico, Oviedo, Spain, 25-27 November 2003.
  • “Cybercrime”, Keynote Presentation, International Conference on Web Engineering (ICWE'03), Oviedo, Spain, 16-18 July 2003.
  • “Insider IT Misuse”, Interpol IT Crime Forum, The Hague, 21 May 2003.
  • “Cybercrime”, Faculty Research Seminar, Middlesex University, 26 March 2003.
  • “Cybercrime: Vandalising the Information Society”, Research Seminar, Kingston University, 12 March 2003.
  • “Cybercrime Expert Panel”, SecurIT Summit, Montreux, Switzerland, 19-21 October 2002. 
  • “Security requirements for online distance learning”, ELATnet modules for multimedia netbased teaching International Workshop, Munich, Germany, 18-20 September 2002.
  • “Mobile Security Biometrics”, Global Information Society Forum.31, Tokyo, Japan, 23 May 2002.
  • “Cybercrime: Vandalising the Information Society”, Guest lecture, Middlesex University, 23 April 2002.
  • “User Authentication Methods for Mobile Systems”, Managing the Mobile Workforce, The Open Group Conference, Paris, France, 9 April 2002.
  • “Network Research at the University of Plymouth”, Port Elizabeth Technikon, South Africa, 7 November 2001.
  • “Security issues in Online Distance Learning”, JCALT Workshop on Security in Virtual Learning Environments, South Bank University, UK. 23 October 2000.
  • "E-commerce: Consumer security fears and expectations", British Computer Society – South West Branch, University of Plymouth, UK. 11 April 2000.
  • “Realising Security Policy within the Healthcare Environment”, University of Cambridge, UK.  3 December 1998.
  • “Computer Abuse: Vandalising the Information Society”, British Computer Society – South West Branch, University of Plymouth, UK. 21 January 1997.

Invited participation in short courses

  • Nineteenth European Intensive Programme on Information & Communications Security (IPICS 2016), Catholic University of Leuven, Belgium, July 2016.
  • Eighteenth European Intensive Programme on Information & Communications Security (IPICS 2015), University of the Aegean, Lesbos, Greece, July 2015.
  • Seventeenth European Intensive Programme on Information & Communications Security (IPICS 2014), University of the Aegean, Mytilene, Greece, July 2014.
  • Sixteenth European Intensive Programme on Information & Communications Security (IPICS 2013), University of the Aegean, Samos, Greece July 2013.
  • Fifteenth European Intensive Programme on Information & Communications Security (IPICS 2012), Technical University of Vienna, Austria, September 2012.
  • Fourteenth European Intensive Programme on Information & Communications Security (IPICS 2011), Ionian University, Corfu, Greece, August 2011.
  • Thirteenth European Intensive Programme on Information & Communications Security (IPICS 10), University of the Aegean, Samos, Greece, July 2010.
  • Twelfth European Intensive Programme on Information & Communications Security (IPICS 09), Technical University of Vienna, Austria, July 2009.
  • Eleventh European Intensive Programme on Information & Communications Security (IPICS 08), University of Regensburg, Germany, July 2008.
  • European Intensive Programme on Information & Communication Technologies Security (IPICS ‘2008) – Ninth Winter School, Rovaniemi, Finland, March 2008.
  • Tenth European Intensive Programme on Information & Communications Security (IPICS 07), University of Glamorgan, Wales, July 2007.
  • Eighth European Intensive Programme on Information & Communications Security (IPICS 05), Chios, Greece, July 2005.
  • European Intensive Programme on Information & Communication Technologies Security (IPICS ‘2005) – Sixth Winter School, Oulu, Finland, 30 March-7 April 2005.
  • Seventh European Intensive Programme on Information & Communications Security (IPICS 04), Graz, Austria, July 2004.
  • European Intensive Programme on Information & Communication Technologies Security (IPICS ‘2004) – Fifth Winter School, Oulu, Finland, 30 March-7 April 2004.
  • Sixth European Intensive Programme on Information & Communications Security (IPICS 03), Malaga, Spain, July 2003.
  • European Intensive Programme on Information & Communication Technologies Security (IPICS ‘2003) – Fourth Winter School, Oulu, Finland, 8-16 April 2003.
  • Fifth European Intensive Programme on Information & Communications Security (IPICS 2002), Samos, Greece, 8-19 July 2002.
  • Fourth European Intensive Programme on Information & Communications Security (IPICS 2001), Samos, Greece, 20-31 August 2001.
  • Second European Intensive Programme on Information & Communications Security (IPICS 99), Chios, Greece, 8-20 August 1999.
  • Guidelines for the Security of Health Information, AIM SEISMED Project - Security Course, Thessaloniki, Greece, 26-30 September 1994.

 

Links

For further details please visit my research centre pages .