Skip to main content

Research Repository

Advanced Search

All Outputs (2)

Information security policy compliance model in organizations (2015)
Journal Article
Sohrabi Safa, N., Von Solms, R., & Furnell, S. (2016). Information security policy compliance model in organizations. Computers and Security, 56, 70-82. https://doi.org/10.1016/j.cose.2015.10.006

© 2015 Elsevier Ltd. All rights reserved. The Internet and information technology have influenced human life significantly. However, information security is still an important concern for both users and organizations. Technology cannot solely guarant... Read More about Information security policy compliance model in organizations.

Continuous user authentication using multi-modal biometrics (2015)
Journal Article
Saevanee, H., Clarke, N., Furnell, S., & Biscione, V. (2015). Continuous user authentication using multi-modal biometrics. Computers and Security, 53, 234-246. https://doi.org/10.1016/j.cose.2015.06.001

© 2015 Elsevier Ltd. As modern mobile devices increase in their capability and accessibility, they introduce additional demands in terms of security - particularly authentication. With the widely documented poor use of PINs, Active Authentication is... Read More about Continuous user authentication using multi-modal biometrics.