Skip to main content

Research Repository

Advanced Search

All Outputs (6)

Accessible authentication: Assessing the applicability for users with disabilities (2021)
Journal Article
Furnell, S., Helkala, K., & Woods, N. (2022). Accessible authentication: Assessing the applicability for users with disabilities. Computers and Security, 113, Article 102561. https://doi.org/10.1016/j.cose.2021.102561

Access to the many benefits available from digital technology can often vary depending upon the capabilities and facilities of the individual who is attempting to engage with it. Many digital devices and services require us to be identified and so re... Read More about Accessible authentication: Assessing the applicability for users with disabilities.

Developing a cyber security culture: Current practices and future needs (2021)
Journal Article
Uchendu, B., Nurse, J. R., Bada, M., & Furnell, S. (2021). Developing a cyber security culture: Current practices and future needs. Computers and Security, 109, Article 102387. https://doi.org/10.1016/j.cose.2021.102387

While the creation of a strong security culture has been researched and discussed for decades, it continues to elude many businesses. Part of the challenge faced is distilling pertinent, recent academic findings and research into useful guidance. In... Read More about Developing a cyber security culture: Current practices and future needs.

An empirical analysis of the information security culture key factors framework (2021)
Journal Article
Tolah, A., Furnell, S. M., & Papadaki, M. (2021). An empirical analysis of the information security culture key factors framework. Computers and Security, 108, Article 102354. https://doi.org/10.1016/j.cose.2021.102354

Information security is a challenge facing organisations, as security breaches pose a serious threat to sensitive information. Organisations face security risks in relation to their information assets, which may also stem from their own employees. Or... Read More about An empirical analysis of the information security culture key factors framework.

Realising a Push Button Modality for Video-Based Forensics (2021)
Journal Article
Zawali, B., Ikuesan, R. A., Kebande, V. R., Furnell, S., & A-Dhaqm, A. (2021). Realising a Push Button Modality for Video-Based Forensics. Infrastructures, 6(4), Article 54. https://doi.org/10.3390/infrastructures6040054

Complexity and sophistication among multimedia-based tools have made it easy for perpetrators to conduct digital crimes such as counterfeiting, modification, and alteration without being detected. It may not be easy to verify the integrity of video c... Read More about Realising a Push Button Modality for Video-Based Forensics.

Exploring touch-based behavioral authentication on smartphone email applications in IoT-enabled smart cities (2021)
Journal Article
Li, W., Meng, W., & Furnell, S. (2021). Exploring touch-based behavioral authentication on smartphone email applications in IoT-enabled smart cities. Pattern Recognition Letters, 144, 35-41. https://doi.org/10.1016/j.patrec.2021.01.019

© 2021 Elsevier B.V. The Internet of Things (IoT) allows various embedded devices and smart sensors to be connected with each other, which provides a basis for building smart cities. The IoT-enabled smart city can greatly benefit people's daily lives... Read More about Exploring touch-based behavioral authentication on smartphone email applications in IoT-enabled smart cities.

Understanding cybersecurity behavioral habits: Insights from situational support (2021)
Journal Article
Hong, Y., & Furnell, S. (2021). Understanding cybersecurity behavioral habits: Insights from situational support. Journal of Information Security and Applications, 57, Article 102710. https://doi.org/10.1016/j.jisa.2020.102710

© 2020 While the Internet has become an indispensable aspect of personal and professional lives, it has also served to render many individuals vulnerable to cybersecurity threats. Thus, the promotion of cybersecurity behaviors can effectively protect... Read More about Understanding cybersecurity behavioral habits: Insights from situational support.