Steve Furnell

Academic profile

Professor Steve Furnell

Visiting Professor of Cyber Security
School of Engineering, Computing and Mathematics (Faculty of Science and Engineering)

The Global Goals

In 2015, UN member states agreed to 17 global Sustainable Development Goals (SDGs) to end poverty, protect the planet and ensure prosperity for all. Steve's work contributes towards the following SDG(s):

Goal 04: SDG 4 - Quality EducationGoal 06: SDG 6 - Clean Water and SanitationGoal 07: SDG 7 - Affordable and Clean EnergyGoal 09: SDG 9 - Industry, Innovation, and InfrastructureGoal 12: SDG 12 - Responsible Consumption and ProductionGoal 14: SDG 14 - Life Below WaterGoal 16: SDG 16 - Peace, Justice and Strong InstitutionsGoal 17: SDG 17 - Partnerships for the Goals

About Steve

Visiting Professor of Cyber SecurityProfessor of Cyber Security, University of NottinghamAdjunct Professor, Edith Cowan University, Perth, Western AustraliaHonorary Professor, Nelson Mandela Metropolitan University, South AfricaVisiting Professor of Cyber Security, University of Suffolk

Supervised Research Degrees

PhD/MPhil completions (* denotes MPhil)As Director of Studies2019 Network Security Intelligence Centres for Information Security Incident Management2019 Advancing User Authentication and Access Management2019 Evaluation and Enhancement of Public Cyber Security Awareness2019 Transparent User Authentication for Mobile Applications2019 An evaluation of targeted security awareness for end users2019 Computational model of negotiation skills in virtual artificial agents2019 Decentralised Hosting and Preservation of Digital Collections2018 Acceptance factors of wearable computing: An empirical investigation2017 A Model for Monitoring End-User Security Policy Compliance2015 Authentication Aura: A cooperative and distributed approach to user authentication on mobile devices2015 Establishment of information security awareness and culture2013 The perspective of usability and perception in information security2013 The aggressive detection of network intrusions2012 Multi-Dimensional Personalisation for the online and offline world2012 Enhancing Automated Intrusion Response Systems2011 An Insider Misuse Threat Detection and Prediction Language2011 Behavioural profiling in mobile networks2011 A Study of Graphical Alternatives for User Authentication2010 Improving Intrusion Prevention, Detection and Response2008 Profiling methods for computer crime and abuse*2007 A Generic Architecture for Insider Misuse Monitoring in IT Systems2007 Two-Tier Intrusion Detection System for Mobile Ad hoc Networks2007 Effective information assurance with risk management2006 Active security vulnerability identification and resolution2006 Non-Intrusive Subscriber Authentication for Next Generation Mobile Communication Systems2004 A generic architecture for intrusion specification & misuse detection in IT systems*2004 Classifying and responding to network intrusions2004 Enhancing subscriber security for mobile phones using biometrics2004 User authentication and supervision in networked systems2001 A model for managing information flow on the World Wide Web2000 Flexible, composite multimedia medical record system for healthcare establishmentsAs supervisor2019 Facial Identification for Digital Forensic2019 A Model for User-centric Information Security Risk Assessment and Response2017 Behavioural Monitoring via Network Communications2017 Federated Authentication using the Cloud (Cloud Aura)2017 A Forensically-Enabled Cloud Computing Architecture2016 Automated Digital Forensics and Computer Crime Profiling2016 Opportunities and Risks in Online Gaming Environments2016 Graphical One-Time-Password Authentication2016 Multiple Stakeholder Perspectives of Complex Online Services: An e-Government Case Study2014 Sustainability Reporting Process Model using Business Intelligence2014 IT Governance in the Health Care Sector2014 Non-Intrusive Continuous User Authentication for Mobile Devices2014 Continuous User Authentication Using Multi-Modal Biometrics2012 A Holistic Approach to Information Security Culture2011 Anomaly-Based Correlation of IDS Alarms2010 Internet Marketing for Profit Organisations: A Framework for the implementation of Strategic Internet Marketing2007 Security Policy Enforcement in Application Environments using Distributed Script-based Control Structures2007 The social and psychological impact of SMS text messaging2007 Dynamic Adaptation of Streamed Real-Time E-Learning Videos over the Internet2004 Integrated multimedia communications for IP networks2004 Performance characterisation of IP networks2003 A Correlation Framework for Continuous User Authentication Using Data Mining2002 A Generic Network and System Management Framework2002 Security in a Distributed Processing Environment2001 Component architectures and their impact upon software development

Teaching

2019/20 delivery commitmentsUndergraduate SEC104 Cyber Security and NetworksSEC202 Secure Systems Architectures and MechanismsSEC301 Information Security Management and Governance*LAW3239 Cybercrime: Issues and Regulation Postgraduate SEC501 Information Security Management and Governance* * denotes module leadershipCourse development activity: Co-Architect of BSc (Hons) Computer & Information Security (2007) Architect of the MSc/MRes Information Systems Security (2003-04) Co-Architect of the MSc/MRes Network Systems Engineering (2002-03)

Contact Steve

A310, Portland Square, Drake Circus, Plymouth, PL4 8AA
+44 1752 586234