Steven Furnell

Affiliations:
  • Plymouth University, Centre for Security, Communications and Network Research


According to our database1, Steven Furnell authored at least 220 papers between 1995 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Evaluation of Contextual and Game-Based Training for Phishing Detection.
Future Internet, 2022

Accessible authentication: Assessing the applicability for users with disabilities.
Comput. Secur., 2022

A Tailored Model for Cyber Security Education Utilizing a Cyber Range.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

Benchmarking Consumer Data and Privacy Knowledge in Connected and Autonomous Vehicles.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

2021

Exploring touch-based behavioral authentication on smartphone email applications in IoT-enabled smart cities.
Pattern Recognit. Lett., 2021

Facing up to security and privacy in online meetings.
Netw. Secur., 2021

Understanding cybersecurity behavioral habits: Insights from situational support.
J. Inf. Secur. Appl., 2021

Towards a cross-cultural education framework for online safety awareness.
Inf. Comput. Secur., 2021

A novel approach for improving information security management and awareness for home environments.
Inf. Comput. Secur., 2021

Pandemic Parallels: What Can Cybersecurity Learn From COVID-19?
Computer, 2021

Developing a cyber security culture: Current practices and future needs.
Comput. Secur., 2021

An empirical analysis of the information security culture key factors framework.
Comput. Secur., 2021

The cybersecurity workforce and skills.
Comput. Secur., 2021

Grano-GT: A granular ground truth collection tool for encrypted browser-based Internet traffic.
Comput. Networks, 2021

What Parts of Usable Security Are Most Important to Users?
Proceedings of the Information Security Education for Cyber Resilience, 2021

Disadvantaged by Disability: Examining the Accessibility of Cyber Security.
Proceedings of the Universal Access in Human-Computer Interaction. Design Methods and User Experience, 2021

Poster: The Need for a Collaborative Approach to Cyber Security Education.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

2020
Comparing the protection and use of online personal information in South Africa and the United Kingdom in line with data protection requirements.
Inf. Comput. Secur., 2020

Privacy risk and the use of Facebook Apps: A gender-focused vulnerability assessment.
Comput. Secur., 2020

Duplicitous social media and data surveillance: An evaluation of privacy risk.
Comput. Secur., 2020

Education for the Multifaith Community of Cybersecurity.
Proceedings of the Information Security Education. Information Security in Action, 2020

Assessing the provision of public-facing cybersecurity guidance for end-users.
Proceedings of the 6th IEEE International Conference on Collaboration and Internet Computing, 2020

2019
Information security burnout: Identification of sources and mitigating factors from security demands and resources.
J. Inf. Secur. Appl., 2019

A framework for reporting and dealing with end-user security policy compliance.
Inf. Comput. Secur., 2019

Identity-as-a-Service: An Adaptive Security Infrastructure and Privacy-Preserving User Identity for the Cloud Environment.
Future Internet, 2019

Deterrence and prevention-based model to mitigate information security insider threats in organisations.
Future Gener. Comput. Syst., 2019

Special issue on security of IoT-enabled infrastructures in smart cities.
Ad Hoc Networks, 2019

Efficient Privacy-preserving User Identity with Purpose-based Encryption.
Proceedings of the 2019 International Symposium on Networks, Computers and Communications, 2019

A Comprehensive Framework for Understanding Security Culture in Organizations.
Proceedings of the Information Security Education. Education in Proactive Information Security, 2019

A Novel Behaviour Profiling Approach to Continuous Authentication for Mobile Applications.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Aligning Security Practice with Policy: Guiding and Nudging towards Better Behavior.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Holistic Information Security Management for Home Environments.
Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance, 2019

Organizational formalization and employee information security behavioral intentions based on an extended TPB model.
Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services, 2019

Automated Trust Negotiation for Cloud Applications in Identity-as-a-Service.
Proceedings of the International Conference on Advanced Communication Technologies and Networking, 2019

Multi-Platform Authorship Verification.
Proceedings of the Third Central European Cybersecurity Conference, 2019

Information Security Risk Communication: A User-Centric Approach.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

2018
Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks.
IEEE Trans. Netw. Serv. Manag., 2018

A novel transparent user authentication approach for mobile applications.
Inf. Secur. J. A Glob. Perspect., 2018

Guest editorial.
Inf. Comput. Secur., 2018

Identifying and predicting the factors affecting end-users' risk-taking behavior.
Inf. Comput. Secur., 2018

Information security collaboration formation in organisations.
IET Inf. Secur., 2018

Facial-Forensic Analysis Tool.
Digit. Investig., 2018

Enhancing security behaviour by supporting the user.
Comput. Secur., 2018

Biometrically Linking Document Leakage to the Individuals Responsible.
Proceedings of the Trust, Privacy and Security in Digital Business, 2018

A National Certification Programme for Academic Degrees in Cyber Security.
Proceedings of the Information Security Education - Towards a Cybersecure Society, 2018

Personalising Security Education: Factors Influencing Individual Awareness and Compliance.
Proceedings of the Information Systems Security and Privacy - 4th International Conference, 2018

Enhancing Security Education - Recognising Threshold Concepts and Other Influencing Factors.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Designing an Anti-Cyberbullying Programme in Thailand.
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018

2017
Security education and awareness: just let them burn?
Netw. Secur., 2017

AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection.
Comput. Secur., 2017

A novel privacy preserving user identification approach for network traffic.
Comput. Secur., 2017

Toward an Automatic Classification of Negotiation Styles Using Natural Language Processing.
Proceedings of the Intelligent Virtual Agents - 17th International Conference, 2017

A novel multimedia-forensic analysis tool (M-FAT).
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Keynote speaker 5: Taming security technology.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Enhancing cyber security awareness with mobile games.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

An analysis of home user security awareness & education.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Insider Misuse Identification using Transparent Biometrics.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

A comperhansive framework for cultivating and assessing Information Security Culture .
Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance, 2017

Identifying the Factors Affecting End-Users’ Risk-Taking Behavior.
Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance, 2017

Insider Misuse Attribution using Biometrics.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Vulnerability management: not a patch on where we should be?
Netw. Secur., 2016

Graphical One-Time Password (GOTPass): A usability evaluation.
Inf. Secur. J. A Glob. Perspect., 2016

Awareness of Mobile Device Security: A Survey of User's Attitudes.
Int. J. Mob. Comput. Multim. Commun., 2016

Leveraging Biometrics for Insider Misuse Identification.
Int. J. Cyber Situational Aware., 2016

A suspect-oriented intelligent and automated computer forensic analysis.
Digit. Investig., 2016

Information security policy compliance model in organizations.
Comput. Secur., 2016

A forensic acquisition and analysis system for IaaS.
Clust. Comput., 2016

Continuous and transparent multimodal authentication: reviewing the state of the art.
Clust. Comput., 2016

Welcome message.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

User profiling from network traffic via novel application-level interactions.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

A survey of cyber-security awareness in Saudi Arabia.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

Information security policies: A review of challenges and influencing factors.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

Proactive biometric-enabled forensic imprinting.
Proceedings of the 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), 2016

A Forensic Acquisition and Analysis System for IaaS: Architectural Model and Experiment.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
A systematic review of approaches to assessing cybersecurity awareness.
Kybernetes, 2015

Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions.
J. Netw. Comput. Appl., 2015

Security transparency: the next frontier for security research in the cloud.
J. Cloud Comput., 2015

Secure Graphical One Time Password (GOTPass): An Empirical Study.
Inf. Secur. J. A Glob. Perspect., 2015

Editorial.
Inf. Comput. Secur., 2015

Surveying the Development of Biometric User Authentication on Mobile Phones.
IEEE Commun. Surv. Tutorials, 2015

Information security conscious care behaviour formation in organizations.
Comput. Secur., 2015

Continuous user authentication using multi-modal biometrics.
Comput. Secur., 2015

Security, Privacy and Usability - A Survey of Users' Perceptions and Attitudes.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015

Awareness, behaviour and culture: The ABC in cultivating security compliance.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

Transparent authentication systems for mobile device security: A review.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

From Passwords to Biometrics: In Pursuit of a Panacea.
Proceedings of the Information Systems Security and Privacy, 2015

An Identification of Variables Influencing the Establishment of Information Security Culture.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

2014
A response selection model for intrusion response systems: Response Strategy Model (RSM).
Secur. Commun. Networks, 2014

Investigating the Viability of Multifactor Graphical Passwords for User Authentication.
Inf. Secur. J. A Glob. Perspect., 2014

A security education Q&A.
Inf. Manag. Comput. Secur., 2014

Performance evaluation of a Technology Independent Security Gateway for Next Generation Networks.
Proceedings of the IEEE 10th International Conference on Wireless and Mobile Computing, 2014

Text-Based Active Authentication for Mobile Devices.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

Alternative Graphical Authentication for Online Banking Environments.
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 2014

2013
Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM).
Secur. Commun. Networks, 2013

Editorial for Security and Privacy in Wireless Networks Special Issue.
Mob. Networks Appl., 2013

An Expert Panel Approach on Developing a Unified System Authentication Benchmarking Index.
Int. J. Interdiscip. Telecommun. Netw., 2013

Co-operative user identity verification using an Authentication Aura.
Comput. Secur., 2013

Assessing the Feasibility of Security Metrics.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2013

A Technology Independent Security Gateway for Real-Time Multimedia Communication.
Proceedings of the Network and System Security - 7th International Conference, 2013

Challenges to digital forensics: A survey of researchers & practitioners attitudes and opinions.
Proceedings of the 2013 Information Security for South Africa, 2013

Security Education: The Challenge beyond the Classroom.
Proceedings of the Information Assurance and Security Education and Training, 2013

Essential Lessons Still Not Learned? Examining the Password Practices of End-Users and Service Providers.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2013

Factors of Password-based Authentication.
Proceedings of the 19th Americas Conference on Information Systems, 2013

2012
Power to the people? The evolving recognition of human aspects of security.
Comput. Secur., 2012

A Novel Security Architecture for a Space-Data DTN.
Proceedings of the Wired/Wireless Internet Communication - 10th International Conference, 2012

Multi-modal Behavioural Biometric Authentication for Mobile Devices.
Proceedings of the Information Security and Privacy Research, 2012

A Response Strategy Model for Intrusion Response Systems.
Proceedings of the Information Security and Privacy Research, 2012

The Insider Threat Prediction and Specification Language.
Proceedings of the Ninth International Network Conference (INC 2012), 2012

Approach to the Evaluation of a Method for the Adoption of Information Technology Governance, Risk Management and Compliance in the Swiss Hospital Environment.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

2011
Establishing A Personalized Information Security Culture.
Int. J. Mob. Comput. Multim. Commun., 2011

Preventative Actions for Enhancing Online Protection and Privacy.
Int. J. Inf. Technol. Syst. Approach, 2011

LUARM: An Audit Engine for Insider Misuse Detection.
Int. J. Digit. Crime Forensics, 2011

Quantifying the Effect of Graphical Password Guidelines for Better Security.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011

SMS linguistic profiling authentication on mobile device.
Proceedings of the 5th International Conference on Network and System Security, 2011

End-User Perception and Usability of Information Security.
Proceedings of the 5th International Symposium on Human Aspects of Information Security and Assurance, 2011

Multifactor graphical passwords: An assessment of end-user performance.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
Insider Threat Specification as a Threat Mitigation Technique.
Proceedings of the Insider Threats in Cyber Security, 2010

Vulnerability management: an attitude of mind?
Netw. Secur., 2010

Usability versus complexity - striking the balance in end-user security.
Netw. Secur., 2010

Mac security: An Apple that can't be bitten?
Netw. Secur., 2010

Online Addiction: A Cultural Comparison of Privacy Risks in Online Gaming Environments.
J. Multim. Process. Technol., 2010

Online identity: Giving it all away?
Inf. Secur. Tech. Rep., 2010

Assessing image-based authentication techniques in a web-based environment.
Inf. Manag. Comput. Secur., 2010

A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm.
Comput. Secur., 2010

IT Governance and Its Impact on the Swiss Healthcare.
Proceedings of the 12th UKSim, 2010

Assessing the Usability of End-User Security Software.
Proceedings of the Trust, 2010

Online addiction: privacy risks in online gaming environments.
Proceedings of the MEDES '10: International ACM Conference on Management of Emergent Digital EcoSystems, 2010

An investigation and survey of response options for Intrusion Response Systems (IRSs).
Proceedings of the Information Security South Africa Conference 2010, 2010

Psycho-Analytical Considerations in Internet Marketing - Focusing on Human Needs And Personal Trust.
Proceedings of the Eighth International Network Conference (INC 2010), 2010

Implications and Risks of MMORPG Addiction: Motivations, Emotional Investment, Problematic Usage and Personal Privacy.
Proceedings of the South African Information Security Multi-Conference, 2010

A distributed and cooperative user authentication framework.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

An Analysis of Information Security Awareness within Home and Work Environments.
Proceedings of the ARES 2010, 2010

2009
Exploring Trust, Security and Privacy in Digital Business.
Trans. Large Scale Data Knowl. Centered Syst., 2009

The irreversible march of technology.
Inf. Secur. Tech. Rep., 2009

Social engineering: assessing vulnerabilities in practice.
Inf. Manag. Comput. Secur., 2009

Editorial.
Comput. Secur., 2009

From desktop to mobile: Examining the security experience.
Comput. Secur., 2009

Flexible and Transparent User Authentication for Mobile Devices.
Proceedings of the Emerging Challenges for Security, 2009

Improving Awareness of Social Engineering Attacks.
Proceedings of the Information Assurance and Security Education and Training, 2009

An Assessment of People's Vulnerabilities in Relation to Personal & Sensitive Data.
Proceedings of the 3rd International Conference on Human Aspects of Information Security and Assurance, 2009

Evaluating Web-Based User Authentication using Graphical Techniques.
Proceedings of the 3rd International Conference on Human Aspects of Information Security and Assurance, 2009

Risk Culture Influences in Internet Safety and Security.
Proceedings of the 3rd International Conference on Human Aspects of Information Security and Assurance, 2009

2008
Security beliefs and barriers for novice Internet users.
Comput. Secur., 2008

Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks.
Ad Hoc Networks, 2008

The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset.
Proceedings of the Trust, 2008

Investigating the problem of IDS false alarms: An experimental study using Snort.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

A Practical Assessment of Social Engineering Vulnerabilities.
Proceedings of the 2nd International Conference on Human Aspects of Information Security and Assurance, 2008

2007
Considering the potential of criminal profiling to combat hacking.
J. Comput. Virol., 2007

A new taxonomy for comparing intrusion detection systems.
Internet Res., 2007

Analysis of security-relevant semantics of BPEL in cross-domain defined business processes.
Inf. Manag. Comput. Secur., 2007

Authenticating mobile phone users using keystroke analysis.
Int. J. Inf. Sec., 2007

Special issue: TrustBus 2006.
Comput. Syst. Sci. Eng., 2007

A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head.
Comput. Secur., 2007

Assessing the security perceptions of personal Internet users.
Comput. Secur., 2007

An assessment of website password practices.
Comput. Secur., 2007

Making security usable: Are things improving?
Comput. Secur., 2007

IFIP workshop - Information security culture.
Comput. Secur., 2007

Advanced user authentication for mobile devices.
Comput. Secur., 2007

Pre-execution Security Policy Assessment of Remotely Defined BPEL-Based Grid Processes.
Proceedings of the Trust, 2007

A Practical Usability Evaluation of Security Features in End-User Applications.
Proceedings of the New Approaches for Security, 2007

Security Policy Enforcement in BPEL-Defined Collaborative Business Processes.
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007

Building a Trusted Community for Mobile Ad Hoc Networks Using Friend Recommendation.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 6th International Conference, 2007

2006
Achieving automated intrusion response: a prototype implementation.
Inf. Manag. Comput. Secur., 2006

Towards an insider threat prediction specification language.
Inf. Manag. Comput. Secur., 2006

Risk and restitution: Assessing how users establish online trust.
Comput. Secur., 2006

The challenges of understanding and using security: A survey of end-users.
Comput. Secur., 2006

Considering the Usability of End-User Security Software.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks - A Friend Approach.
Proceedings of the Intelligence and Security Informatics, 2006

2005
Informing the decision process in an automated intrusion response system.
Inf. Secur. Tech. Rep., 2005

An automated framework for managing security vulnerabilities.
Inf. Manag. Comput. Security, 2005

A preliminary model of end user sophistication for insider threat prediction in IT systems.
Comput. Secur., 2005

Why users cannot use security.
Comput. Secur., 2005

Authentication of users on mobile telephones - A survey of attitudes and practices.
Comput. Secur., 2005

A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks.
Proceedings of the 4th European Conference on Information Warfare and Security, 2005

Computer insecurity - risking the system.
Springer, ISBN: 978-1-85233-943-2, 2005

2004
Multi-dimensional-personalisation for location and interest-based recommendation.
Internet Res., 2004

A practical evaluation of Web analytics.
Internet Res., 2004

A long-term trial of alternative user authentication technologies.
Inf. Manag. Comput. Secur., 2004

A Protection Profiles Approach to Risk Analysis for Small and Medium Enterprises.
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004

A Long-term Trial of Keystroke Profiling using Digraph, Trigraph and Keyword Latencies.
Proceedings of the Security and Protection in Information Processing Systems, 2004

The Darker Side of Innovation.
Proceedings of the IT Innovation for Adaptability and Competitiveness, 2004

A Framework For Role-based Monitoring of Insider Misuse.
Proceedings of the Information Security Management, Education and Privacy, 2004

Approaches to IT Security in Small and Medium Enterprises.
Proceedings of the 2nd Australian Information Security Management Conference, 2004

2003
Keystroke dynamics on a mobile handset: a feasibility study.
Inf. Manag. Comput. Secur., 2003

Considering the Problem of Insider IT Misuse.
Australas. J. Inf. Syst., 2003

Using Keystroke Analysis as a Mechanism for Subscriber Authentication on Mobile Handsets.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Improving Security Awareness Through Computer-based Training.
Proceedings of the Security Education and Critical Infrastructures, 2003

Cybercrime: Vandalizing the Information Society.
Proceedings of the Web Engineering, International Conference, 2003

Operational Characteristics of an Automated Intrusion Response System.
Proceedings of the Communications and Multimedia Security, 2003

2002
Assessing the global accessibility of the Internet.
Internet Res., 2002

An experimental comparison of secret-based user authentication technologies.
Inf. Manag. Comput. Secur., 2002

Insider Threat Prediction Tool: Evaluating the probability of IT misuse.
Comput. Secur., 2002

Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices.
Comput. Secur., 2002

A web-based resource migration protocol using WebDAV.
Proceedings of the Eleventh International World Wide Web Conference, 2002

Keystroke Analysis as a Method of Advanced User Authentication and Response.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

Addressing Internet Security Vulnerabilities: A Benchmarking Study.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

2001
Network quality of service monitoring for IP telephony.
Internet Res., 2001

Security analysers: administrator assistants or hacker helpers?
Inf. Manag. Comput. Secur., 2001

The Resource Locator Service: fixing a flaw in the web.
Comput. Networks, 2001

Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining.
Proceedings of the Information Assurance in Computer Networks: Methods, 2001

Security Vulnerabilities and System Intrusions - The Need for Automatic Response Frameworks.
Proceedings of the Advances in Information Security Management & Small Systems Security, 2001

2000
Internet-based security incidents and the potential for false alarms.
Internet Res., 2000

A conceptual architecture for real-time intrusion monitoring.
Inf. Manag. Comput. Secur., 2000

Authentication and Supervision: A Survey of User Attitudes.
Comput. Secur., 2000

1999
Security implications of electronic commerce: a survey of consumers and businesses.
Internet Res., 1999

Strategies for content migration on the World Wide Web.
Internet Res., 1999

Dissecting the "Hacker Manifesto".
Inf. Manag. Comput. Secur., 1999

Computer hacking and cyber terrorism: the real threats in the new millennium?
Comput. Secur., 1999

Computer crime and abuse: A survey of public attitudes and awareness.
Comput. Secur., 1999

1998
A security framework for online distance learning and training.
Internet Res., 1998

Methods of Responding to Healthcare Security Incidents.
Proceedings of the MEDINFO '98, 1998

1997
Computer abuse: vandalizing the information society.
Internet Res., 1997

ODESSA - a new approach to healthcare risk analysis.
Proceedings of the Information Security in Research and Business, 1997

Network Resource Adaptation in the DOLMEN Service Machine.
Proceedings of the Intelligence in Services and Networks: Technology for Cooperative Competition, 1997

1996
Baseline Security Guidelines for Health Care Management.
Proceedings of the Data Security for Health Care - Volume I: Management Guidelines, 1996

The SEISMED Guidelines for Host Systems Security.
Proceedings of the Towards Security in Medical Telematics - Legal and Technical Aspects, 1996

Applications of keystroke analysis for improved login security and continuous user authentication.
Proceedings of the Information Systems Security, 1996

Approaches to Security in Healthcare Multimedia Systems.
Proceedings of the Communications and Multimedia Security II, 1996

1995
Data security in European healthcare information systems.
PhD thesis, 1995


  Loading...