No profile picture available

Professor Andy Phippen

  • aphippen1 at bournemouth dot ac dot uk
  • Professor of IT Ethics and Digital Rights
Back to top

Journal Articles

  • Furnell, S. and Phippen, A., 2012. Online privacy: A matter of policy? Computer Fraud and Security, 2012 (8), 12-18.
  • Kasturiratne, D., Lean, J. and Phippen, A., 2012. International enterprise education in Sri Lanka: A blended approach. Education and Training, 54 (4), 306-318.
  • Furnell, S., Von Solms, R. and Phippen, A., 2011. Preventative Actions for Enhancing Online Protection and Privacy. International Journal of Information Technologies and Systems Approach, 4 (2), 1-11.
  • Coakes, E., Bryant, A., Land, F. and Phippen, A., 2011. The dark side of technology: Some sociotechnical reflections. International Journal of Sociotechnology and Knowledge Development, 3 (4), 40-51.
  • Atkinson, S., Furnell, S. and Phippen, A., 2009. Securing the next generation: enhancing e-safety awareness among young people. Computer Fraud and Security, 2009 (7), 13-19.
  • Furnell, S., Shams, R. and Phippen, A., 2008. Who guides the little guy? Exploring security advice and guidance from retailers and ISPs. Computer Fraud and Security, 2008 (12), 6-10.
  • Furnell, S., Tsaganidi, V. and Phippen, A., 2008. Security beliefs and barriers for novice Internet users. Computers and Security, 27 (7-8), 235-240.
  • Phippen, A. and Furnell, S., 2007. Taking responsibility for online protection - why citizens have their part to play. Computer Fraud and Security, 2007 (11), 8-13.
  • Atkinson, S., Johnson, C. and Phippen, A., 2007. Improving protection mechanisms by understanding online risk. Information Management and Computer Security, 15 (5), 382-393.
  • Furnell, S.M., Bryant, P. and Phippen, A.D., 2007. Assessing the security perceptions of personal Internet users. Computers and Security, 26 (5), 410-417.
  • Lacohee, H., Phippen, A.D. and Furnell, S.M., 2006. Risk and restitution: Assessing how users establish online trust. Computers and Security, 25 (7), 486-493.
  • Phippen, A. and Lacohée, H., 2006. eGovernment - Issues in citizen engagement. BT Technology Journal, 24 (2), 205-208.
  • Phippen, A.D., Taylor, J. and Allen, R., 2005. Issues in moving from web services to service orientation. Internet Research, 15 (5), 518-526.
  • Phippen, A.D., 2004. An evaluative methodology for virtual communities using web analytics. Campus-Wide Information Systems, 21 (5), 179-184.
  • Joshi, P., Singh, H. and Phippen, A.D., 2004. Web services: Measuring practitioner attitude. Internet Research, 14 (5), 366-371.
  • Schilke, S.W., Bleimann, U., Furnell, S.M. and Phippen, A.D., 2004. Multi-dimensional-personalisation for location and interest-based recommendation. Internet Research, 14 (5), 379-385.
  • Phippen, A., Sheppard, L. and Furnell, S., 2004. A practical evaluation of Web analytics. Internet Research, 14 (4), 284-293.
  • Evans, M.P., Phippen, A.D., Mueller, G., Furnell, S.M., Sanders, P.W. and Reynolds, P.L., 1999. Strategies for content migration on the World Wide Web. Internet Research, 9 (1), 25-34.
  • Knahl, M., Hofmann, H.D. and Phippen, A., 1999. A distributed component framework for integrated network and systems management. Information Management and Computer Security, 7 (5), 254-260.

Books

  • Phippen, A. and Bond, E., 2020. Organisational Responses to Social Media Storms - An Applied Analysis of Modern Challenges. Routledge.
  • Phippen, A. and Brennan, M., 2019. Child protection and safeguarding technologies: Appropriate or excessive ‘Solutions’ to social problems?.
  • Gray, S.L. and Phippen, A., 2017. Invisibly Blighted The Digital Erosion of Childhood. Ucl Ioe Press.
  • Phippen, A., 2016. Children’s Online Behaviour and Safety Policy and Rights Challenges. Springer.
  • Phippen, A. and Lacohée, H., 2016. The impact of fibre connectivity on SMEs: Benefits and business opportunities.

Chapters

  • Bond, E. and Phippen, A., 2020. Tackling teen sexting—policing challenges when society and technology outpace legislation. Advanced Sciences and Technologies for Security Applications. 157-177.
  • Phippen, A. and Bond, E., 2020. Image recognition in child sexual exploitation material—capabilities, ethics and rights. Advanced Sciences and Technologies for Security Applications. 179-198.
  • Phippen, A., 2016. Cyberbullying and Peer-Oriented Online Abuse. Online Risk to Children: Impact, Protection and Prevention: First Edition. 37-54.
  • Hennessy, C.H., Staelens, Y., Lankshear, G., Phippen, A., Silk, A. and Zahra, D., 2014. Rural connectivity and older people’s leisure participation. Countryside Connections: Older People, Community and Place in Rural Britain. 63-94.

Conferences

  • Heckmann, B., Zinn, M., Moore, R.C., Wentzel, C. and Phippen, A.D., 2012. Economic efficiency control on data centre resources in heterogeneous cost scenarios. 675-679.
  • Heckmann, B., Phippen, A.D., Moore, R.C. and Wentzel, C., 2012. Agreeing on and controlling service levels in service-oriented architectures. 267-270.
  • Zinn, M., Fischer-Hellmann, K.P., Schuette, A. and Phippen, A.D., 2011. Information demand model for software unit reuse. 32-39.
  • Zinn, M., Fischer-Hellmann, K.P., Schuette, A. and Phippen, A.D., 2011. Reusable software units integration knowledge in a distributed development environment. 24-35.
  • Zinn, M., Bepperling, A., Fischer-Hellmann, K.P., Schuette, A. and Phippen, A.D., 2011. Reuseable software unit knowledge for device deployment. 314-321.
  • Zinn, M., Bepperling, A., Schoop, R., Phippen, A.D. and Fischer-Hellmann, K.P., 2010. Device services as reusable units of modelling in a service-oriented environment: An analysis case study. 1728-1735.
  • Zincir, I., Furnell, S. and Phippen, A., 2010. Behavioural profiling for impostor detection in mobile networks. 334-342.
  • Heckmann, B. and Phippen, A.D., 2010. Quantitative and qualitative description of the consumer to provider relation in the context of Utility Computing. 335-344.
  • Zinn, M., Fischer-Hellmann, K.P., Phippen, A.D. and Schütte, A., 2010. Finding reusable units of modelling - An ontology approach. 377-386.
  • Atkinson, S., Furnell, S.M. and Phippen, A.D., 2009. Risk culture influences in internet safety and security. 61-70.
  • Heckmann, B., Stengel, I., Turetschek, G. and Phippen, A., 2009. Utility computing simulation. 175-180.
  • Lacohee Dr., H. and Phippen Dr., A., 2008. "Every Breath You Take, Every Move You Make, I'Ll Be Watching You:"The Social Impact Of Surveillance Technology. 81-88.
  • Schneider, O., Bleimann, U., Phippen, A.D. and Harriehausen-Mühlbauer, B., 2008. Inside coherence: Concept for a non-linear elearning solution. 223-233.
  • Atkinson, S., Johnson, C. and Phippen, A., 2007. Personal privacy threats: A taxonomy for risk assessment. 264-272.
  • Atkinson, S., Johnson, C. and Phippen, A., 2007. Vulnerable groups and the impact of technology upon personal privacy. 55-66.
  • Atkinson, S., Jagodzinski, P., Johnson, C. and Phippen, A., 2006. Semantic Web: A personal privacy perspective. 435-441.
  • Schilke, S.W., Bleimann, U., Stengel, I. and Phippen, A.D., 2006. Fitting extended blended learning and multi-dimensional-personalization into learning management systems. 393-400.
  • Atkinson, S., Jagodzinski, P., Johnson, C. and Phippen, A., 2006. Personal privacy: Exploitation or control through technology. 269-276.
  • Schneider, O., Bleimann, U., Harriehausen, B. and Phippen, A.D., 2006. Non-linear extended blended learning. 377-384.
  • Taylor, J., Phippen, A.D. and Allen, R., 2005. Issues in implementing service oriented architectures. 343-350.
  • Zincir, I., Furnell, S. and Phippen, A., 2005. Intrusion detection via behavioural profiling on mobile and wireless networked devices. 67-71.
  • Evans, M.P., Furnell, S.M., Phippen, A.D. and Reynolds, P.L., 1998. Mobility considerations for integrated telecommunications service environments. 101-105.

Others

  • Phippen, A. and Ashby, S., 2013. Digital behaviors and people risk: Challenges for risk management. Published.
  • Schneider, O., Bleimann, U., Phippen, A.D. and Harriehausen-Mühlbauer, B., 2009. Simplified creation and presentation of non-linear adaptive content. Published.
  • Evans, M.P., Kettunen, K.T., Blackwell, G.K., Furnell, S.M., Phippen, A.D., Hope, S. and Reynolds, P.L., 1997. Network resource adaptation in the DOLMEN service machine. Published.
The data on this page was last updated at 04:20 on October 24, 2020.