Professor Paul Haskell-Dowland
BSc (Hons), PhD, SMIEEE, MACS (Snr) CP, IP3P, FBCS, FHEA, FAISA

Brief biographical information

Professor of Cyber Security Practice, Edith Cowan University, Perth, Australia

[email protected]
https://www.ecu.edu.au/schools/science/staff/profiles/associate-deans/dr-paul-haskell-dowland

                             

Professor Paul Haskell-Dowland is the Professor of Cyber Security Practice and Associate Dean for Computing and Security in the School of Science at Edith Cowan University, Perth, Australia.  Paul has delivered keynotes, invited presentations, workshops, professional development/training and seminars across the world for audiences including RSA Security, ITU and IEEE. He has appeared on local, national and international media (newspaper, radio and tv) commenting on current cyber issues with a global audience reach of more than three billion people. His contributions through articles published in The Conversation have reached over three million readers - joining the top-50 all-time authors in Australia/New Zealand (top-10 in 2021). Paul has more than 25 years of experience in cyber security research and education leadership in both the UK and Australia.

Paul is the Chair and the ACS/Australian Country Member Representative to the International Federation for Information Processing (IFIP) Technical Committee 11 (TC11 - Security and Privacy Protection in Information Processing Systems); secretary to IFIP Working Group 11.1 (Information Security Management); a member of the ACS Cyber Security Committee; a Senior Member of the IEEE and the ACS (Certified Professional); and, a Fellow of the Higher Education AcademyBCS and the Australian Information Security Association.  He is the author of over 100 papers in refereed international journals and conference proceedings and edited 33 books/proceedings. Paul is a member of the editorial board for the Elsevier journal Computers and Security; and the editorial advisory board for the Heliyon journal, as well as being an active reviewer for ten journals.

Research interests

  • Teaching and Learning Technologies
  • Learner and Learning Analytics
  • Security Education
  • Child eSafety
  • Network Monitoring
  • Authentication Technologies

Education/qualifications

  • 1998-2004 PhD, "User Authentication and Supervision in Networked Systems"
  • 2000-2001 Postgraduate Certificate of Learning and Teaching in Higher Education (LTHE)
  • 1994-1998 B.Sc. (Hons) Computing and Informatics (1st Class)

Professional memberships

  • Professional member of the Association for Computing Machinery (ACM), January 2022
  • FAISA Fellow of the Australian Information Security Association, April 2021
  • MAISA Member of the Australian Information Security Association, September 2019
  • Senior Member of the ACS - Certified Professional MACS (Snr) CP and IP3P, December 2016
  • SMIEEE (Senior Member of the IEEE), April 2016
  • Member of the Council of Professors and Heads of Computing (CPHC), September 2015
  • MIEEE (Member of the IEEE), August 2015
  • Fellow of the Higher Education Academy (FHEA), 2013
  • FBCS (Fellow of British Computer Society), September 2010
  • MBCS (Member of British Computer Society), April 2004

External appointments

  • Australian Research Council, Future Fellowships Reviewer, 2022 (on-going)
  • Australian Research Council, Discovery Reviewer, 2019 (on-going)
  • Australian Research Council, Linkage Reviewer, 2019 (on-going)
  • Australian Research Council, DECRA Reviewer, 2019 (on-going)
  • Chair of the IFIP Technical Committee on Security and Privacy Protection in Information Processing Systems (TC11), 2022-2025
  • Industry Advisory Group (North Metropolitan TAFE) representative, 2018 (on-going)
  • Member of the IFIP TC 11 Working Group 11.12 on Human Aspects of Information Security and Assurance, 20xx (on-going)
  • Secretary & Webmaster, IFIP TC11 Working Group 11.1 on Information Security Management, 2004 (on-going)
  • Working Group Coordinator, IFIP TC11, June 2017 (on-going)
  • Australian Research Council, General Assessor and Selection Advisory Committee panel member for Industrial Transformation Research Program (Research Hubs and Training Centres) (2018, 2019)
  • Reviewer for National Research Foundation (NRF), South Africa
  • External examiner, MSc Information Technology and MSc Software Development at the University of Glasgow, January 2014 - December 2016
  • Branch Committee Member & Webmaster, BCS South West, April 2004-2016
  • External examiner, Information Technology, Information Technology with Management, Information Technology with Economics, Business Information Technology awards at the University of Reading, October 2007 - September 2011
  • Programme validation event - external panel member, MSc Computer Networking, NEWI, May 2007
  • External examiner, MSc Computing, Computer Science, Forensic Computing, Distance Learning, Multimedia and Web Multimedia awards at the University of Stafford, January 2007 - December 2011
  • SAHFOS Honorary Fellow in recognition of work to develop the WinCPR, North Sea Plankton Database, April 2005 (renewed 2015)
  • Programme validation event - external panel member, University of Portsmouth, May 2005
  • Programme validation event - external panel member, University of Greenwich at Medway, March 2005

Awards

  • Honour Award for Outstanding Contributions to the Media in 2022
  • 'Most prolific author from ECU for The Conversation in 2022', 2022
  • Outstanding Research Communication, ECU Vice-Chancellor's Staff Award 2022
  • Business Events Perth's 2022 Aspire Award
  • INCS-CoE Community Expert, 2022
  • IEEE Technical Committe on Homeland Security, Research and Innovation Award, 2022
  • 'Most prolific author from ECU for The Conversation in 2021', 2021
  • 'Most prolific author from ECU for The Conversation in 2020', 2020
  • 'Cyber Security Educator of the Year', WA Cyber Awards (school nomination), 2019
  • 'Most widely read article by an ECU researcher in The Conversation', 2019
  • IFIP Silver Core recipient, 2010

Grants and other income

  • Sharing Cybersercurity Research Data SCReeD, Cyber Security Research Centre Ltd, Grant, 2022 - 2024, AUD $100,000
  • Augmenting Cyber Defence Capability (ACDC), Cyber Security Research Centre Ltd, Grant, 2022 - 2024, AUD $885,000
  • Cyber training – Incident Analyst, Department of Defence, 2022-2023, AUD $1,945,356
  • Semantic modelling of Digital Twins for Cyber Security Defence Automation, Commonwealth Scientific and Industrial Research Organisation (CSIRO), 2021 - 2024, AUD $150,000
  • Cyber training – Incident Analyst, Department of Defence, 2021-2022, AUD $1,884,774
  • In-Circuit Forensic Analysis of IoT Memory Modules, Cyber Security Research Centre Ltd, Cyber Security Research Centre PhD Scholarship, 2020 - 2023, AUD $180,000
  • Data – Increased cybersecurity risk from working at home, Department of Jobs, Tourism, Science and Innovation, Covid-19 Research Fund, 2020 - 2022, AUD $135,554
  • Heterogeneous Anomaly Detection from Network Traffic Streams using Data Summarization, Cyber Security Research Centre Ltd, Cyber Security Research Centre Masters Scholarship, 2020 - 2022, AUD $120,000
  • Co-ordinated as CRC Theme Lead
    • Postdoc funding theme 2.4 - #1, Cyber Security Research Centre Ltd, Cyber Security Research Centre PostDoc Scholarship, 2019-2022, AUD $501,150
    • Postdoc funding theme 2.4 - #2, Cyber Security Research Centre Ltd, Cyber Security Research Centre PostDoc Scholarship, 2019-2022, AUD $500,765
    • Honeypot Deployment Architecture, Cyber Security Research Centre Ltd, Cyber Security Research Centre MBR Scholarship, 2019-2021, AUD $130,000
    • The lived experience of hacking victims: Implications for support and prevention, Cyber Security Research Centre Ltd, Cyber Security Research Centre Honours Scholarship, 2019, AUD $35,000
    • Measuring and Mitigating Vigilance Decrement in Cyber Network Defence Tasks, Cyber Security Research Centre Ltd, Cyber Security Research Centre PhD Scholarship, 2019 - 2022, AUD $225,000
  • IoT Testbed, 2018. AUD $20,000.  Co-Investigator. The proposed IoT testbed will enable the School of Science to establish an IoT based infrastructure with various sensors, connected to a virtualised platform that would enable researchers and lecturers to simulate various use-cases and scenarios, taking into consideration the dynamic cyber threat landscape within the IoT space.
  • Innovation and Entrepreneurship in the Digital Economy, 2017, AUD $20,300, Co-Investigator. This project investigates the digital economy through the lens of innovation and entrepreneurship. It also activates local and regional partnerships to support this research and initiate research knowledge translation. It proposes a collaborative Industry/University workshop and research project with data gathering about innovative small and micro-businesses in the digital economy. It brings together ECU experts across the Schools of Business and Law and, Science, together with industry professionals from entrepreneurship, economic development, financial and technology fields.
  • Academic Centre of Cyber Security Excellence, Department of Education and Training, 2017-2021, AUD $950,288
  • Intelligent Building Security: An investigation into Vulnerabilities, Current Practice and Security Management Best Practice, March 2017 - June 2018, AUD $79,339, Co-Investigator. The research will develop an evidence based framework of IB vulnerabilities, resulting in guidelines to educate and inform the security professional.
  • Increasing low SES female participation in computer and security science, Edith Cowan University (Perth, Australia), March 2017 to December 2017, AUD $66,402.40, Co-Lead. This initiative aims to improve: pre-tertiary low SES, and Indigenous, female student understanding of, and aspirations for, Higher Education in the computer and security disciplines. Furthermore, the project is intended to extend secondary teachers (career counsellors) understanding of careers in Computing & Security Science.
  • KTP Associate Project (Essential 6, Paignton), 2015-2017, funded by the Department of Trade and Industry (DTI) £109,633
  • Superfast Network Monitoring Project (Cornwall Development Company), 2013-2015, £48,048
  • Network Monitoring Proof of Concept Project (partners not disclosed), 2012-2015 ~£15,000
  • e-Invigilator (Teaching Fellowship), 2012-2013
  • KTP Associate Project (Westland Geo Projects, Bude), 2008-2010, funded by the Department of Trade and Industry (DTI), £109,633
  • Online Peer Assessment (Teaching Fellowship), 2008-2009
  • End Point Compliance. Symantec.2007: £7,000
  • KTP Associate Project (Corpdata, Exeter), 2004-2006, funded by the Department of Trade and Industry (DTI), £99,044
  • A CD and web-based gridded database and browser for North Atlantic plankton, 2004-2006, funded by the NERC, £49,349
  • Biometric Terminal - Phase 2, Orange, 2004
  • Security Technology in a Virtual University (Virtusec), 2003-2005, funded by the British Council in Collaboration with Darmstadt University of Applied Science, £4,000
  • PC Integrity Testing. Plymouth Trading Standards. 2003-2004: £1,250
  • Biometric Terminal - Phase 1, Orange, 2003
  • TCS Associate Project (John Nicholls Builders, Goonhavern), 2002-2004, funded by the Department of Trade and Industry (DTI), project value: £97,653
  • WinCPR Software Development. SAHFOS. 2002: £4,000
  • TCS Associate Project (Intasoft Limited, Exeter), 2001-2003, funded by the Department of Trade and Industry (DTI), project value: £88,733
  • Cybersign, Orange, 1999
  • Tools for On-Line Distance Learning, 1997-1999
  • HGML Phase 1, Orange, 1997-1998

Journal papers

Examination of Traditional Botnet Detection on IoT-Based Bots
Woodiss-Field A, Johnstone M, Haskell-Dowland PS (Dowland PS)
Sensors, Vol. 24, Iss. 3, pp1027, 2024
More details | External link available

Energy-Efficient Covert Wireless Communication Through Probabilistic Jamming
Lu X, Huang Y, Yan S, Yang W, Haskell-Dowland PS (Dowland PS)
IEEE Wireless Communications Letters, Vol. 12, Iss. 5, pp932-936, 2023
More details | External link available

Establishment and mapping of heterogeneous anomalies in network intrusion datasets
Riddell L, Ahmed M, Haskell-Dowland PS (Dowland PS)
Connection Science, Volume 34, Issue 1, pp2755-2783, 2022
More details | External link available

Biometric Security: A Novel Ear Recognition Approach Using a 3D Morphable Ear Model
Mursalin M, Ahmed M, Haskell-Dowland PS (Dowland PS)
Sensors, 22, 8988, DOI: 10.3390/s22228988, 2022
More details | External link available

Anomaly Detection in Cybersecurity Datasets via Cooperative Co-evolution-based Feature Selection
Rashid BANM, Ahmed M, Sikos L, Haskell-Dowland PS (Dowland PS)
ACM Transactions on Management Information Systems, Issue 3, No. 29, pp 1–39, 2022
More details | External link available

ECU-IoHT: A dataset for analyzing cyberattacks in Internet of Health Things
Ahmed M, Byreddy S, Nutakki A, Sikos L, Haskell-Dowland PS (Dowland PS)
Ad Hoc Networks, Vol. 121, ISSN 1570-8705, 2021
More details | External link available

An Energy-Efficient and Secure Data Inference Framework for Internet of Health Things: A Pilot Study
Kang J, Dibaei M, Luo G, Yang W, Haskell-Dowland PS (Dowland PS), Zheng X
Sensors, Vol. 21, No. 1: 312, 2021
More details | External link available

Cooperative co‑evolution for feature selection in Big Data with random feature grouping
Rashid BANM, Ahmed M, Sikos L, Haskell-Dowland PS (Dowland PS)
Journal of Big Data, 7, 107, 2020
More details | External link available

No Soldiers Left Behind: An IoT-based Low-Power Military Mobile Health System Design
Kang J, Yang W, Dermody G, Ghasemian M, Adibi S, Haskell-Dowland PS (Dowland PS)
IEEE Access, ISSN: 2169-3536, Vol. 8, pp201498-201515, 2020
More details | External link available

A Novel Penalty-Based Wrapper Objective Function for Feature Selection in Big Data using Cooperative Co-Evolution
Rashid BANM, Ahmed M, Sikos L, Haskell-Dowland PS (Dowland PS)
IEEE Access, Vol.8, pp150113 - 150129, 2020
More details | External link available

Intelligent Building Systems: Security and Facility Professionals' Understanding of System Threats, Vulnerabilities and Mitigation Practice
Brooks D, Coole M, Haskell-Dowland PS (Dowland PS)
Security Journal, Vol. 33 No.2, pp244–265, 2019
More details | External link available

Behavioral Profiling for Transparent Verification in Cloud Storage Services
Al-Bayati B, Clarke NL, Haskell-Dowland PS (Dowland PS), Li F
Journal of Information Warfare, pp88-105, 2019
More details

A Survey of Distributed Certificate Authorities in MANETs
Chaudhry J, Saleem K, Haskell-Dowland PS (Dowland PS), Miraz M
Annals of Emerging Technologies in Computing (AETiC),, vol. 2, iss. 3, pp11-18, 2018
More details | External link available

A toolkit approach to information security awareness and education
Korovessis P, Furnell SM, Papadaki M, Haskell-Dowland PS (Dowland PS)
Journal of Cybersecurity Education, Research and Practice, Vol. 2017, Iss. 2, Art. 5, ISSN: 2472-2707, 2017
More details | External link available

The impact of security and its antecedents in behaviour intention of using e-government services
Alharbi N, Papadaki M, Haskell-Dowland PS (Dowland PS)
Journal of Behaviour and Information Technology, ISSN: 0144-929X, Vol 36, Iss 6, pp620-636, 2017
More details | External link available

Literature Studies on Security Warnings Development
Zaaba ZF, Furnell SM, Haskell-Dowland PS (Dowland PS)
International Journal on Perceptive and Cognitive Computing, Vol 2, Iss 1, pp8-18, 2016
More details | External link available

A Comprehensive Evaluation of Feature Selection for Gait Recognition Using Smartwatches
Al-Naffakh N, Clarke NL, Haskell-Dowland PS (Dowland PS), Li F
International Journal for Information Security Research, Volume 6, Issue 3, 2016
More details | External link available

Graphical One-Time Password (GOTPass): A usability evaluation
Alsaiari H, Papadaki M, Haskell-Dowland PS (Dowland PS), Furnell SM
Information Security Journal: a Global Perspective, ISSN: 1939-3547, Vol 25, Iss 1-3, pp94-108, 2016
More details | External link available

Adaptive Behavioral Profiling for Identity Verification in Cloud Computing: A Model and Preliminary Analysis
Al-Bayati B, Clarke NL, Haskell-Dowland PS (Dowland PS)
GSTF Journal on Computing (JOC), ISSN:2251-3043, Vol. 5, Iss.1, pp21-28, 2016
Winner of the Best Student Paper award at the 7th Annual International Conference on ICT: Big Data, Cloud and Security (ICT-BDCS 2016).
More details | External link available

Secure Graphical One Time Password (GOTPass): An Empirical Study
Alsaiari H, Papadaki M, Haskell-Dowland PS (Dowland PS), Furnell SM
Information Security Journal: A Global Perspective, 24, pp207-220, 2015
More details | External link available

Security Factors Influencing End Users' Adoption of E-Government
Alharbi N, Papadaki M, Haskell-Dowland PS (Dowland PS)
Journal of Internet Technology and Secured Transaction (JITST), Volume 3, Issues 3/4, pp320-328, 2014
More details | External link available

Investigating the Viability of Multifactor Graphical Passwords for User Authentication
Jali MZ, Furnell SM, Haskell-Dowland PS (Dowland PS)
Information Security Journal: A Global Perspective, 00:1–12, ISSN: 1939-3555, Published online: 18 Apr 2014, 2014
More details | External link available

Active authentication for mobile devices utilising behaviour profiling
Li F, Clarke NL, Papadaki M, Haskell-Dowland PS (Dowland PS)
International Journal of Information Security, Volume 13, Issue 3, pp229-244, ISSN:1615-5262, 2014
More details | External link available

Misuse Detection for Mobile Devices Using Behaviour Profiling
Li F, Clarke NL, Papadaki M, Haskell-Dowland PS (Dowland PS)
International Journal of Cyber Warfare & Terrorism, Volume 1, Issue 1, pp43-55, ISSN: 1947-3435, 2011
More details | External link available

Massively Multi-Player Online Role Playing Games: What’s the Risk?
Sanders B, Haskell-Dowland PS (Dowland PS), Atkinson S, Furnell SM
Journal of Virtual Worlds Research, vol. 3, no. 3, ISSN: 1941-8477, 2011
More details | External link available

Online Addiction: A Cultural Comparison of Privacy Risks in Online Gaming Environments
Sanders B, Haskell-Dowland PS (Dowland PS), Atkinson S, Zahra D, Furnell SM, Papadaki M
Journal of Multimedia Processing Technologies, vol. 1, no. 3, September, pp181-193, ISSN: 0976-4127, 2010
More details | External link available

Assessing image-based authentication techniques in a web-based environment
Jali MZ, Furnell SM, Haskell-Dowland PS (Dowland PS)
Information Management & Computer Security, Vol.18, Iss.1, pp43-53, 2010
More details | External link available

An automated framework for managing security vulnerabilities
Alayed A, Furnell SM, Zhao D, Haskell-Dowland PS (Dowland PS)
Information Management & Computer Security, vol. 13, no. 2, pp156-166, 2005
More details

A long-term trial of alternative user authentication technologies
Furnell SM, Papadopoulos I, Haskell-Dowland PS (Dowland PS)
Information Management and Computer Security, Vol. 12, No. 2, pp178-190, 2004
More details

A prototype tool for information security awareness and training
Furnell SM, Gennatou M, Haskell-Dowland PS (Dowland PS)
International Journal of Logisitics Information Management, vol. 15, no. 5, pp352-357, 2002
More details

An experimental comparison of secret-based user authentication
technologies

Irakleous I, Furnell SM, Haskell-Dowland PS (Dowland PS), Papadaki M
Information Management and Computer Security, vol. 10, no. 3, pp100-108, 2002
More details

Security analysers: Administrator Assistants or Hacker Helpers?
Furnell SM, Chiliarchaki P, Haskell-Dowland PS (Dowland PS)
Information Management and Computer Security, vol. 9, no.2, pp93-101, 2001
More details

Authentication and Supervision: A survey of user attitudes
Furnell SM, Haskell-Dowland PS (Dowland PS), Illingworth HM, Reynolds PL
Computers & Security, vol. 19, no. 6, pp529-539, 2000
Please note: the electronic copy of the survey referred to in this paper is no longer available.
More details

A conceptual architecture for real-time intrusion monitoring
Furnell SM, Haskell-Dowland PS (Dowland PS)
Information Management and Computer Security, vol. 8, no. 2, pp65-74, 2000
More details

Computer Crime and Abuse: A Survey of Public Attitudes and Awareness
Haskell-Dowland PS (Dowland PS), Furnell SM, Illingworth HM, Reynolds PL
Computers & Security, vol. 18, no. 8, pp715-726, 1999
Please note: the electronic copy of the survey referred to in this paper is no longer available.
More details

Dissecting the 'Hacker Manifesto'
Furnell SM, Haskell-Dowland PS (Dowland PS), Sanders P
Information Management and Computer Security, vol.7, no.2 pp69-75, 1999
More details

36 Journal papers

Conference papers

On Relaying Strategies in Multi-Hop Covert Wireless Communications
Yu X, Yan S, Hu J, Haskell-Dowland PS (Dowland PS), Han Y, Ng DWK
IEEE International Conference on Communications, pp666-672, DOI: 10.1109/ICC45855.2022.9838514, 2022
More details | External link available

Towards Evaluating the Effectiveness of Botnet Detection Techniques
Woodiss-Field A, Johnstone M, Haskell-Dowland PS (Dowland PS)
International Conference on Ubiquitous Security (UBISEC 2021), pp 292-308 (published 2022), Springer, DOI: 10.1007/978-981-19-0468-4_22, 2021
More details | External link available

IoT Threat Detection Advances, Challenges and Future Directions
Karie NM, Sahri NM, Haskell-Dowland PS (Dowland PS)
2020 Workshop on Emerging Technologies for Security in IoT (ETSecIoT), 21-21 April, Sydney, Australia, 2020
More details | External link available

Building a Better Micro:Bit IDE – Teaching Computer Science
Ellis M, Thompson G, Haskell-Dowland PS (Dowland PS)
INTED2020 Proceedings of the 14th International Technology, Education and Development Conference, Valencia, Spain, 2-4 March, ISBN: 978-84-09-17939-8, pp8425-8433, 2020
More details | External link available

The Hop Portal Snowglobe Architecture: Making Virtual Reality Functional
Chady T, Haskell-Dowland PS (Dowland PS)
INTED2020 Proceedings of the 14th International Technology, Education and Development Conference, Valencia, Spain, 2-4 March, ISBN: 978-84-09-17939-8, pp8395-8403, 2020
More details | External link available

Good guidance or mistaken misdirection: Assessing the quality of password advice
Furnell SM, Haskell-Dowland PS (Dowland PS)
Proceedings of the Annual Information Institute Conference, 2020 Information Institute Las Vegas Conference, 2020
More details | External link available

Hybrid Routing for Man-in-the-Middle (MITM) Attack Detection in IoT Networks
Kang J, Fahd K, Venkatraman S, Trujillo-Rasua R, Haskell-Dowland PS (Dowland PS)
2019 29th International Telecommunication Networks and Applications Conference (ITNAC), ISBN: 978-1-7281-3674-5, pp. 1-6, 2019
More details | External link available

Addressing STEM Geek Culture Through Peer Learning
Vasileiou I, Haskell-Dowland PS (Dowland PS)
EDULEARN19 Proceedings, pp5289-5293, Palma, Mallorca, Spain, 2019
More details | External link available

From Model B To Micro:Bit – Teaching Computer Science
Ellis M, Thompson G, Haskell-Dowland PS (Dowland PS)
Proceedings of EDULEARN19 Conference, pp2725-2731, Palma, Mallorca, Spain, 2019
More details | External link available

Design Principles and Guidelines for Targeted Security Awareness
Mahmoud N, Furnell SM, Haskell-Dowland PS (Dowland PS)
Proceedings of the Annual Information Institute Conference, March 26-28, Las Vegas, USA, ISBN: 978-1-935160-19-9, 2018
More details | External link available

Misuse Detection in a Simulated IaaS Environment
Al-Bayati B, Clarke NL, Haskell-Dowland PS (Dowland PS), Li F
1st International Workshop on Emerging Technologies for Authorization and Authentication, ISBN: 978-3-030-04371-1, pp103-115, 2018
More details | External link available

Continuous identity verification in cloud storage services using behavioural profiling
Al-Bayati B, Clarke NL, Haskell-Dowland PS (Dowland PS), Li F
17th European Conference on Cyber Warfare and Security ECCWS 2018, 28-29 June, ISBN: 978-1-911218-85-2, pp1-10, 2018
More details | External link available

Transparent Authentication: Utilising Heart Rate for User Authentication
Enamamu T, Clarke NL, Haskell-Dowland PS (Dowland PS), Li F
International Conference for Internet Technology and Secured Transactions (ICITST-2017) , pp283-289, ISBN:978-1-9083-207-97, 2017
More details | External link available

Body Temperature Authentication for Secure Smartwatch to Smart Device Communication
Enamamu T, Clarke NL, Haskell-Dowland PS (Dowland PS), Li F
Proceedings of the IEEE International Conference on Computing, Networking and Informatics (ICCNI 2017) , ISBN: 978-1-5090-4643-0, pp1-7, 2017
More details | External link available

Unobtrusive Gait Recognition Using Smartwatches
Al-Naffakh N, Clarke NL, Li F, Haskell-Dowland PS (Dowland PS)
International Conference of the Biometrics Special Interest Group (BIOSIG), 20-22 September, Darmstadt, Germany, pp211-218, ISBN 978-3-88579-664-0, 10.23919/BIOSIG.2017.8053523, 2017
More details | External link available

Towards Targeted Security Awareness Raising
Mahmoud N, Furnell SM, Haskell-Dowland PS (Dowland PS)
Proceedings of the Annual Information Institute Conference, 18-20 April, Las Vegas, USA, ISBN: 978-1-935160-18-2, 2017
More details | External link available

Activity Recognition using wearable computing
Al-Naffakh N, Clarke NL, Haskell-Dowland PS (Dowland PS), Li F
11th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 189-195, Barcelona, Spain, 2016
More details | External link available

Increasing eLearning Engagement Using Mobile Technologies
Triantafyllidis A, Clarke NL, Haskell-Dowland PS (Dowland PS), Vranopoulos G
9th annual International Conference of Education, Research and Innovation (ICERI2016), 14-16 November, Seville, Spain, pp8644-8653, ISBN: 978-84-617-5895-1, ISSN: 2350-1095, 2016
More details | External link available

The Value of the Biometrics in Invigilated E-Assessments
Ketab S, Clarke NL, Haskell-Dowland PS (Dowland PS)
Proceedings of the the 8th Annual International Conference on Education and New Learning Technologies, Barcelona, Spain, 4-6 July, ISBN: 978-84-608-8860-4, ISSN: 2340-1117, 2016
More details | External link available

A Review of Graphical Authentication Utilising a Keypad Input Method
Alsaiari H, Papadaki M, Haskell-Dowland PS (Dowland PS), Furnell SM
Proceedings of The 8th Saudi Students Conference, January 31 - February 1, pp359-374, 2015
More details | External link available

E-Invigilation of E-Assessments
Ketab S, Clarke NL, Haskell-Dowland PS (Dowland PS)
Proceedings of INTED2015 Conference 2nd-4th March 2015, Madrid, Spain, ISBN: 978-84-606-5763-7, 2015
More details

Nonvisual Presentation, Navigation and Manipulation of Structured Documents on Mobile and Wearable Devices
Dorigo M, Harriehausen-Mühlbauer B, Stengel I, Haskell-Dowland PS (Dowland PS)
International Conference on Computers for Handicapped Persons, ISBN: 978-3-319-08595-1, pp383-390, 2014
More details | External link available

Security challenges of e-government adoption based on end users' perspective
Alharbi N, Papadaki M, Haskell-Dowland PS (Dowland PS)
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions (ICITST 2014), London, UK, pp78-82, ISBN: 978-1-908320-39-1, 2014
More details | External link available

Alternative Graphical Authentication for Online Banking Environments
Alsaiari H, Papadaki M, Haskell-Dowland PS (Dowland PS), Furnell SM
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2014), Plymouth, UK, July 8-9, pp122-136, ISBN: 978-1-84102-375-5, 2014
Can be ordered on-line.
More details

Connected In-Car Multimedia: Qualities Affecting Composability of Dynamic Functionality
Knirsch A, Wietzke J, Moore R, Haskell-Dowland PS (Dowland PS)
Proceedings of the Tenth International Network Conference (INC 2014), Plymouth, UK, July 8-9, pp81-93, ISBN: 978-1-84102-373-1, 2014
Can be ordered on-line.
More details

Nonvisual Presentation and Navigation within the Structure of Digital Text-Documents on Mobile Devices
Dorigo M, Harriehausen-Mühlbauer B, Stengel I, Haskell-Dowland PS (Dowland PS)
7th International Conference, UAHCI 2013, Las Vegas, NV, USA, July 21-26, ISBN: 978-3-642-39193-4, pp311-320, 2013
More details | External link available

Learning management systems in higher education: a faculty perspective
Triantafyllidis A, Clarke NL, Haskell-Dowland PS (Dowland PS)
6th International Conference of Education, Research and Innovation (ICERI2013), Madrid, Spain, ISBN: 978-84-616-3847-5, pp5120-5130, 2013
More details | External link available

E-Invigilator: A Biometric-Based Supervision System for e-Assessments
Clarke NL, Haskell-Dowland PS (Dowland PS), Furnell SM
The International Conference on Information Society (i-Society 2013), Toronto, Canada, 24-26 June, 2013
More details

Learning management systems in higher education: a student perspective
Triantafyllidis A, Clarke NL, Haskell-Dowland PS (Dowland PS)
5th International Conference of Education, Research and Innovation (ICERI2012), Madrid, Spain, ISBN: 978-84-616-0763-1, pp4046-4055, 2012
More details | External link available

Assessing the usability of application level security warnings
Zaaba ZF, Furnell SM, Haskell-Dowland PS (Dowland PS), Stengel I
Eleventh Annual Security Conference, Las Vegas, Nevada, US, 11-13 April, 2012
More details

Teleoperation of mobile robots over wireless internet
Dorigo M, Harriehausen-Mühlbauer B, Stengel I, Haskell-Dowland PS (Dowland PS)
Proceedings of the 4th International Conference on Internet Technologies and Applications, ITA 11; Wrexham, Wales; United Kingdom, ISBN:978-094688168-0, pp145-151, 2011
More details

Survey: improving document accessibility from the blind and visually impaired user's point of view
Dorigo M, Harriehausen-Mühlbauer B, Stengel I, Haskell-Dowland PS (Dowland PS)
Proceedings of the 6th International Conference on Universal Access in Human-Computer Interaction. Applications and Services, pp129-135, 978-3-642-21656-5, 2011
More details | External link available

Multifactor Graphical Passwords: An Assessment of End-User Performance
Jali MZ, Furnell SM, Haskell-Dowland PS (Dowland PS)
Proceedings of the 7th International Conference of Information Assurance & Security (IAS2011), Melaka, Malaysia, 5-8 December 2011. IEEE 978-1-4577-2153-3, 2011
More details

Quantifying the effect of graphical password guidelines for better security
Jali MZ, Furnell SM, Haskell-Dowland PS (Dowland PS)
Future Challenges in Security and Privacy for Academia and Industry (SEC 2011), Lucerne, Switzerland, 7-9 June 2011. Volume 354/2011, Springer-Verlag, pp80-91, 2011
More details | External link available

Resource Management for Multicore Aware Software Architectures of In-Car Multimedia Systems
Knirsch A, Wietzke J, Moore R, Haskell-Dowland PS (Dowland PS)
Lecture Notes in Informatics (LNI) - Proceedings, Series of the Gesellschaft für Informatik (GI), Volume P-192, 9th Workshop Automotive Software Engineering, INFORMATIK 2011: Informatik schafft Communities, 4.–7. October 2011, Berlin, p216, ISBN: 978-3-88579-286-4, (full text is available online), 2011
More details | External link available

Emerging risks in massively multiplayer online role playing games
Sanders B, Atkinson S, Haskell-Dowland PS (Dowland PS), Furnell SM, Papadaki M
EU Kids Online Conference, Friday 23 September, New Academic Building LSE, 2011
More details | External link available

Behaviour Profiling for Transparent Authentication for Mobile Devices
Li F, Clarke NL, Papadaki M, Haskell-Dowland PS (Dowland PS)
Proceedings of the 10th European Conference on Information Warfare and Security (ECIW), Tallinn, Estonia 7-8 July, pp307-314, 2011
Awarded best PhD paper.
More details

End-User Perception and Usability of Information Security
Zaaba ZF, Furnell SM, Haskell-Dowland PS (Dowland PS)
Proceedings of the Fifth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2011), London, UK, ISBN: 978-1-84102-284-0, pp97-107, 2011
Can be ordered on-line.
More details

Online Addiction: Privacy Risks in Online Gaming Environments
Sanders B, Chen V, Zahra D, Haskell-Dowland PS (Dowland PS), Atkinson S, Papadaki M, Furnell SM
Proceedings of the International Conference on Management of Emergent Digital EcoSystems (MEDES), October 26-29, Bangkok, Thailand, 2010
More details

Behaviour Profiling on Mobile Devices
Li F, Clarke NL, Papadaki M, Haskell-Dowland PS (Dowland PS)
International Conference on Emerging Security Technologies, 6-8 September, Canterbury, UK, pp77-82, 2010
More details | External link available

Implications and Risks of MMORPG Addiction: Motivations, Emotional Investment, Problematic Usage and Personal Privacy
Sanders B, Haskell-Dowland PS (Dowland PS), Furnell SM
Proceedings of the South African Information Security Multi-Conference (SAISMC 2010), Port Elizabeth, South Africa, 17-18 May, ISBN: 978-1-84102-256-7, pp61-73, 2010
Can be ordered on-line.
More details

A Critical Evaluation of an Online Peer Assessment System (OPAS)
Clarke NL, Haskell-Dowland PS (Dowland PS)
Proceedings of the International Conference of Education, Research and Innovation (ICERI 2009), 16-18th November, Madrid, Spain, 2009
More details

Evaluating Web-Based User Authentication using Graphical Techniques
Jali MZ, Furnell SM, Haskell-Dowland PS (Dowland PS)
Proceedings of the Third International Symposium on Human Aspects of Information Security & Assurance (HAISA 2009), Athens, Greece, ISBN: 978-1-84102-231-4, pp108-118, 2009
Can be ordered on-line.
More details

An Assessment of People’s Vulnerabilities in Relation to Personal and Sensitive Data
Sanders B, Haskell-Dowland PS (Dowland PS), Furnell SM
Proceedings of the Third International Symposium on Human Aspects of Information Security & Assurance (HAISA 2009), Athens, Greece, ISBN: 978-1-84102-231-4, pp50-60, 2009
Can be ordered on-line.
More details

Service-Oriented Architecture: Performance Issues and Approaches
Swientek M, Bleimann U, Haskell-Dowland PS (Dowland PS)
Proceedings of the Seventh International Network Conference (INC2008), Plymouth, UK, 8-10 July, pp261-269, 2008
Can be ordered on-line.
More details

A practical usability evaluation of security features in end-user applications
Furnell SM, Katsabas D, Haskell-Dowland PS (Dowland PS), Reid F
Proceedings of the 22nd IFIP International Information Security Conference (IFIP SEC 2007), Sandton, South Africa, 14-16 May, pp. 205-216, 2007
More details

Considering the Usability of End-User Security Software
Furnell SM, Jusoh A, Katsabas D, Haskell-Dowland PS (Dowland PS)
Proceedings of 21st IFIP International Information Security Conference (IFIP SEC 2006), Karlstad, Sweden, 22-24 May, pp307-316, 2006
More details

Using Human Computer Interaction principles to promote usable security
Katsabas D, Furnell SM, Haskell-Dowland PS (Dowland PS)
Proceedings of Fifth International Network Conference (INC 2005), July 5-7, Samos, Greece, pp235-242, 2005
More details

Identifying the security requirements for virtual university environments
Ruiz VC, Furnell SM, Phippen AD, Haskell-Dowland PS (Dowland PS), Stengel I, Bleimann U
Proceedings of the Fourth Security Conference 2005, Las Vegas, USA, 30-31 March, 2005
More details

Survey of Wireless Access Point Security
Voisin M, Ghita BV, Haskell-Dowland PS (Dowland PS)
Proceedings of the Fourth Security Conference 2005, Las Vegas, USA, 30-31 March, 2005
More details

PassImages : an alternative method of user authentication
Charruau D, Furnell SM, Haskell-Dowland PS (Dowland PS)
Proceedings of the ISOneWorld 2005, Las Vegas, USA, 30 March - 1 April, 2005
More details

A Long-term Trial of Keystroke Profiling using Digraph, Trigraph and Keyword Latencies
Haskell-Dowland PS (Dowland PS), Furnell SM
Proceedings of IFIP/SEC 2004 - 19th International Conference on Information Security, Toulouse, France, 23-26 August, pp275-289, 2004
More details

A Correlation Framework for Continuous User Authentication Using Data Mining
Singh H, Furnell SM, Haskell-Dowland PS (Dowland PS), Lines BL, Kaur S
Proceedings of the Fourth International Network Conference (INC 2004), Plymouth, UK, 6-9 July 2004, pp237-245, 2004
More details

Improving Security Awareness And Training Through Computer-Based Training
Furnell SM, Warren A, Haskell-Dowland PS (Dowland PS)
Proceedings of the WISE Conference, Monterey, USA, July, pp287-301, 2003
More details

Assessing IT Security Culture: System Administrator and End-User
Finch J, Furnell SM, Haskell-Dowland PS (Dowland PS)
Proceedings of ISOneWorld Conference 2003, Las Vegas, USA, April 23-25, CD Only, 2003
More details

Critical awareness ? The problem of monitoring security vulnerabilities
Furnell SM, Alayed A, Barlow I, Haskell-Dowland PS (Dowland PS)
Proceedings of European Conference on Information Warfare and Security, 8-9 July 2002, Brunel, UK, pp85-92, 2002
More details

Keystroke Analysis as a Method of Advanced User Authentication and
Response

Haskell-Dowland PS (Dowland PS), Furnell SM, Papadaki M
Proceedings of IFIP/SEC 2002 - 17th International Conference on Information
Security, Cairo, Egypt, 7-9 May, pp215-226, 2002
More details

A Preliminary Investigation of User Authentication Using Continuous Keystroke Analysis
Haskell-Dowland PS (Dowland PS), Singh H, Furnell SM
Proceedings of the IFIP 8th Annual Working Conference on Information Security Management & Small Systems Security, Las Vegas, 27-28 September, 2001
More details

Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining
Singh H, Furnell SM, Lines BL, Haskell-Dowland PS (Dowland PS)
Proceedings of International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security, St. Petersburg, Russia, 21-23 May, 2001
More details

A Generic Taxonomy for Intrusion Specification and Response
Furnell SM, Magklaras GB, Papadaki M, Haskell-Dowland PS (Dowland PS)
Proceedings of Euromedia 2001, Valencia, Spain, 18-20 April, 2001
More details

Promoting security awareness and training within small organisations
Furnell SM, Gennatou M, Haskell-Dowland PS (Dowland PS)
Proceedings of the First Australian Information Security Management (AISM) Workshop, Geelong, Australia, 7 November, 2000
More details

A conceptual intrusion monitoring architecture and thoughts on practical implementation
Haskell-Dowland PS (Dowland PS), Furnell SM
Proceedings of the World Computer Congress 2000, 21-25 August, 2000
More details

Enhancing Operating System Authentication Techniques
Haskell-Dowland PS (Dowland PS), Furnell SM
Proceedings of the Second International Network Conference (INC 2000), Plymouth, UK, pp253-261, 3-6 July, 2000
More details

Developing tools to support online distance learning
Furnell SM, Evans MP, Haskell-Dowland PS (Dowland PS)
Proceedings of EUROMEDIA 2000, Antwerp, Belgium, 8-10 May, 2000
More details

64 Conference papers

Books

E-mail Security: A Pocket Guide
Furnell SM, Haskell-Dowland PS (Dowland PS)
IT Governance Publishing, ISBN: 978-1849280969, pp108, 2010
More details | External link available

1 Books

Edited books

Cybersecurity Teaching in Higher Education
Sikos L, Haskell-Dowland PS (Dowland PS)
Springer, pp139, ISBN: 978-3-031-24216-8, 2023
More details | External link available

Cybersecurity for Smart Cities
Ahmed M, Haskell-Dowland PS (Dowland PS)
Springer, ISBN: 978-3-031-24945-7, 2023
More details | External link available

Next-Generation Enterprise Security and Governance
Ahmed M, Moustafa N, Barkat A, Haskell-Dowland PS (Dowland PS)
Routledge, pp288, ISBN 9780367639624, 2022
More details | External link available

Secure Edge Computing: Applications, Techniques and Challenges
Ahmed M, Haskell-Dowland PS (Dowland PS)
CRC Press, 304pp, ISBN: 9780367464141, 2021
Purchase copy at Routledge.com
More details | External link available

Advances in Communications, Electronics, Networks, Robotics and Security Volume 13
Haskell-Dowland PS (Dowland PS)
Plymouth University, ISBN: 978-1-326-72810-6, pp160, 2016
Purchase copy at Lulu.com (Print On Demand)
More details | External link available

Proceedings of the Eleventh International Network Conference (INC 2016)
Alekseev S, Haskell-Dowland PS (Dowland PS), Ghita BV, Schneider O
Frankfurt, Germany, 19-21 July, ISBN: 978-1-84102-410-3, pp192, 2016
Purchase copy at Lulu.com (Print On Demand)
More details | External link available

Advances in Communications, Computing, Electronics, Networks, Robotics and Security Volume 12
Haskell-Dowland PS (Dowland PS)
Plymouth University, ISBN: 978-1-326-72586-0, pp172, 2015
Purchase copy at Lulu.com (Print On Demand)
More details | External link available

Advances in Communications, Computing, Networks and Security Volume 11
Haskell-Dowland PS (Dowland PS)
Plymouth University, ISBN: 978-184102-374-8, pp144, 2014
Purchase copy at Lulu.com (Print On Demand)
More details | External link available

Proceedings of the Tenth International Network Conference (INC 2014)
Haskell-Dowland PS (Dowland PS), Furnell SM, Ghita BV
Plymouth, 8-10 July, ISBN: 978-1-84102-373-1, pp197, 2014
Purchase copy at Lulu.com (Print On Demand)
More details | External link available

Advances in Communications, Computing, Networks and Security Volume 10
Haskell-Dowland PS (Dowland PS), Furnell SM
Plymouth University, ISBN: 978-184102-358-8, pp229, 2013
Purchase copy at Lulu.com (Print On Demand)
More details | External link available

Proceedings of the Ninth International Network Conference (INC 2012)
Botha RA, Haskell-Dowland PS (Dowland PS), Furnell SM
Port Elizabeth, South Africa, 11-12 July, ISBN: 9781841023151, pp238, 2012
Purchase copy at Lulu.com (Print On Demand)
More details | External link available

Advances in Communications, Computing, Networks and Security Volume 9
Haskell-Dowland PS (Dowland PS), Furnell SM
Plymouth University, ISBN: 978-184102-320-5, pp217, 2012
Purchase copy at Lulu.com (Print On Demand)
More details | External link available

Advances in Communications, Computing, Networks and Security Volume 8
Haskell-Dowland PS (Dowland PS), Furnell SM
Plymouth University, ISBN: 978-1-84102-293-2, pp293, 2011
Purchase copy at Lulu.com (Print On Demand)
More details | External link available

Proceedings of the Seventh Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2011)
Haskell-Dowland PS (Dowland PS), Grout VM, Humm B, Knahl MH
Plymouth University, ISBN: 978-1-84102-295-6, pp117, 2011
Purchase copy at Lulu.com (Print On Demand)
More details | External link available

Advances in Communications, Computing, Networks and Security Volume 7
Haskell-Dowland PS (Dowland PS), Furnell SM
Plymouth University, ISBN: 978-1-84102-283-3, pp285, 2010
Purchase copy at Lulu.com (Print On Demand)
More details | External link available

Proceedings of the Sixth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2010)
Haskell-Dowland PS (Dowland PS), Humm B, Knahl MH
University of Plymouth, ISBN: 978-1-84102-269-7, pp81, 2010
Purchase copy at Lulu.com (Print On Demand)
More details | External link available

Proceedings of the Eighth International Network Conference (INC 2010)
Bleimann U, Haskell-Dowland PS (Dowland PS), Furnell SM, Schneider O
Heidelberg, Germany, 8-10 July, ISBN: 978-1-84102-259-8, pp413, 2010
Purchase copy at Lulu.com (Print On Demand)
More details | External link available

Advances in Communications, Computing, Networks and Security 6
Haskell-Dowland PS (Dowland PS), Furnell SM
University of Plymouth, ISBN: 978-1-84102-258-1, pp321, 2009
Purchase copy at Lulu.com (Print On Demand)
More details | External link available

Proceedings of the Fifth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2009)
Bleimann U, Haskell-Dowland PS (Dowland PS), Furnell SM, Grout VM
University of Plymouth, ISBN: 978-1-84102-236-9, 223pp, 2009
Purchase copy at Lulu.com (Print On Demand)
More details | External link available

Proceedings of the 11th IFIP TC 11.1 Working Conference on Information Security Management
Haskell-Dowland PS (Dowland PS), Furnell SM
Richmond, Virginia on 16-17 October, ISBN: 978-3-901882-31-9, pp127, 2008
Purchase copy at Lulu.com (Print On Demand)
More details

Advances in Communications, Computing, Networks and Security 5
Haskell-Dowland PS (Dowland PS), Furnell SM
University of Plymouth, ISBN: 978-1-84102-257-4, pp323, 2008
Purchase copy at Lulu.com (Print On Demand)
More details | External link available

Proceedings of the Fourth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2008)
Bleimann U, Haskell-Dowland PS (Dowland PS), Furnell SM, Grout VM
University of Plymouth, ISBN: 978-1-84102-196-6, 215pp, 2008
Purchase copy at Lulu.com (Print On Demand)
More details

Proceedings of the 7th International Network Conference (INC 2008)
Haskell-Dowland PS (Dowland PS), Furnell SM
University of Plymouth, ISBN: 978-1-84102-188-1, 289pp, 2008
Purchase copy at Lulu.com (Print On Demand)
More details | External link available

Advances in Networks, Computing and Communications 4
Haskell-Dowland PS (Dowland PS), Furnell SM
University of Plymouth, ISBN: 978-1-84102-180-5, pp304, 2007
Purchase copy at Lulu.com (Print On Demand)
More details | External link available

Proceedings of the Third Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2007)
Bleimann U, Haskell-Dowland PS (Dowland PS), Furnell SM
University of Plymouth, ISBN: 978-1-8410-2173-7, 273pp, 2007
Purchase copy at Lulu.com (Print On Demand)
More details

Advances in Networks, Computing and Communications 3
Haskell-Dowland PS (Dowland PS), Furnell SM
University of Plymouth, ISBN: 978-1-8410-2179-9, pp277, 2006
Purchase copy at Lulu.com (Print On Demand)
More details | External link available

Proceedings of the 6th International Network Conference (INC 2006)
Furnell SM, Haskell-Dowland PS (Dowland PS)
University of Plymouth, ISBN 1-84102-157-1, 428pp, 2006
Purchase copy at Lulu.com (Print On Demand)
More details | External link available

Security Management, Integrity, and Internal Control in Information Systems
Haskell-Dowland PS (Dowland PS), Furnell SM, Thuraisingham B, Wang XS
Springer, ISBN 0-387-29826-6. 373pp, 2005
More details

Advances in Network and Communications Engineering 2
Furnell SM, Haskell-Dowland PS (Dowland PS)
University of Plymouth, ISBN: 1-84102-140-7, pp191, 2005
Purchase copy at Lulu.com (Print On Demand)
More details | External link available

Proceedings of the 5th International Network Conference (INC 2005)
Furnell SM, Haskell-Dowland PS (Dowland PS), Kormentzas G
University of the Aegean & University of Plymouth, ISBN 978-1-84102-272-7, 576pp, 2005
Purchase copy at Lulu.com (Print On Demand)
More details | External link available

Proceedings of the 4th International Network Conference (INC 2004)
Furnell SM, Haskell-Dowland PS (Dowland PS)
University of Plymouth, ISBN 1 84102 125 3, 592pp, 2004
Purchase copy at Lulu.com (Print On Demand)
More details | External link available

Proceedings of the 8th Annual Scientific Conference (Euromedia 2003)
Furnell SM, Haskell-Dowland PS (Dowland PS)
Eurosis, ISBN 90-77301-01-5, 222pp, 2003
More details

Proceedings of the 3rd International Network Conference (INC 2002)
Furnell SM, Haskell-Dowland PS (Dowland PS)
University of Plymouth, ISBN 1-84102-105-9, 638pp, 2002
Purchase copy at Lulu.com (Print On Demand)
More details | External link available

33 Edited books

Contributions to edited books

Information Security and Privacy – Challenges and Outlook
Furnell SM, Haskell-Dowland PS (Dowland PS), et al. (multiple authors)
Advancing Research in Information and Communication Technology, pp 383-401, ISBN: 978-3-030-81700-8, 2021
More details | External link available

User Authentication Technologies
Clarke NL, Haskell-Dowland PS (Dowland PS), Furnell SM
in Securing Information and Communications Systems: Principles, Technologies, and Applications. S.M.Furnell, S.K.Katsikas, J.Lopez and A.Patel (Eds), Artech House, ISBN 978-1-59693-228-9, pp35-59, 2008
Available on-line.
More details

Security Concepts, Services, and Threats
Haskell-Dowland PS (Dowland PS), Furnell SM
in Securing Information and Communications Systems: Principles, Technologies, and Applications. S.M.Furnell, S.K.Katsikas, J.Lopez and A.Patel (Eds), Artech House, ISBN 978-1-59693-228-9, pp5-20, 2008
Available on-line.
More details

3 Contributions to edited books

Posters

3D Facial Recognition and Eye Tracking
Ketab S, Clarke NL, Haskell-Dowland PS (Dowland PS)
The Postgraduate Society Conference, 16th March 2016, Plymouth University, 2016
More details

E-invigilation of E-Assessments
Ketab S, Clarke NL, Haskell-Dowland PS (Dowland PS)
The Postgraduate Society Conference, 19th March, Plymouth University, 2014
More details

Enhancing Intrusion Response in Networked System
Papadaki M, Furnell SM, Haskell-Dowland PS (Dowland PS), Lines BL, Reynolds PL
Poster presentation at Britain's Younger Engineers in 2002, House of Commons, London, 9 December, 2002
More details

Non-Intrusive Subscriber Authentication for 3G Mopbile System
Clarke NL, Haskell-Dowland PS (Dowland PS), Furnell SM, Reynolds PL, Rodwell PM
Poster presentation at Britain's Younger Engineers in 2001, House of Commons, London, 3 December, 2001
More details

Advanced Authentication and Intrusion Detection Technologies
Haskell-Dowland PS (Dowland PS), Furnell SM, Magklaras GB, Papadaki M, Reynolds PL, Rodwell PM, Singh H
Poster presentation at Britain's Younger Engineers in 2000, House of Commons, London, 4 December, 2000
More details

5 Posters

Internal publications

Firewall Rulebase Analysis Tool
Jain P, Haskell-Dowland PS (Dowland PS)
Advances in Communications, Computing, Networks and Security Volume 10, ISBN: 978-1-84102-358-8, pp96-103, 2013
Can be ordered on-line.
More details

Evaluation of Current E-Safety Software
Latif Z, Haskell-Dowland PS (Dowland PS)
Advances in Communications, Computing, Networks and Security Volume 8, ISBN: 978-1-84102-293-2, pp76-87, 2011
Can be ordered on-line.
More details

Operational Business Intelligence – A Key to Just-in-Time Decision Making (JDM)
Saeed B, Knahl MH, Frey-Luxemburger M, Haskell-Dowland PS (Dowland PS)
Proceedings of the Seventh Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2011), Furtwangen, Germany, ISBN: 978-1-84102-295-6, pp77-87, 2011
Can be ordered on-line.
More details | External link available

System Design for Embedded Automotive Systems
Vergata S, Wietzke J, Schütte A, Haskell-Dowland PS (Dowland PS)
Proceedings of the Sixth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2010), Plymouth, UK, ISBN: 978-1-84102-269-7, pp53-60, 2010
Can be ordered on-line.
More details

An Approach for Structuring Heterogeneous Automotive Software Systems by use of Multicore Architectures
Knirsch A, Wietzke J, Moore R, Haskell-Dowland PS (Dowland PS)
Proceedings of the Sixth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2010), Plymouth, UK, ISBN: 978-1-84102-269-7, pp19-30, 2010
Can be ordered on-line.
More details

Web-Based Plankton Data Visualisation
Ho TT, Haskell-Dowland PS (Dowland PS)
Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp285-293, 2009
Can be ordered on-line.
More details

Implementation of the Least Privilege Principle on Windows XP, Windows Vista and Linux
Scalbert L, Haskell-Dowland PS (Dowland PS)
Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp226-233, 2009
Can be ordered on-line.
More details

An Assessment of People's Vulnerabilities in Relation to Personal and Sensitive Data
Sanders B, Haskell-Dowland PS (Dowland PS)
Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp124-134, 2009
Can be ordered on-line.
More details

CentOS Linux 5.2 and Apache 2.2 vs. Microsoft Windows Web Server 2008 and IIS 7.0 when Serving Static and PHP Content
Moore DJ, Haskell-Dowland PS (Dowland PS)
Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp92-97, 2009
Can be ordered on-line.
More details

Network Security, Guidelines to Build a Security Perimeter for SMEs
Godon S, Haskell-Dowland PS (Dowland PS)
Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp40-47, 2009
Can be ordered on-line.
More details

A SOA Middleware for High-Performance Communication
Swientek M, Humm B, Bleimann U, Haskell-Dowland PS (Dowland PS)
Proceedings of the Fifth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2009), Darmstadt, Germany, ISBN: 978-1-84102-236-9, pp123-133, 2009
Can be ordered on-line.
More details

Online Gaming: An Emerging Avenue for Exploitation?
Sanders B, Haskell-Dowland PS (Dowland PS), Furnell SM
Proceedings of the Fifth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2009), Darmstadt, Germany, ISBN: 978-1-84102-236-9, pp29-42, 2009
Can be ordered on-line.
More details

Investigating Options of Securing Web Application
Meemeskul T, Haskell-Dowland PS (Dowland PS)
Advances in Communications, Computing, Networks and Security 5, ISBN: 978-1-84102-257-4, pp267-273, 2008
Can be ordered on-line.
More details

Investigating, Implementing and Evaluating Client-Side Keystroke Analysis User Authentication for Web Sites
Hocking C, Haskell-Dowland PS (Dowland PS)
Advances in Communications, Computing, Networks and Security 5, ISBN: 978-1-84102-257-4, pp126-134, 2008
Can be ordered on-line.
More details

Implementing a Visual Network Management Console
Agbai OC, Haskell-Dowland PS (Dowland PS)
Advances in Communications, Computing, Networks and Security 5, ISBN: 978-1-84102-257-4, pp89-98, 2008
Can be ordered on-line.
More details

A Survey of User Opinions and Preference Towards Graphical Authentication
Jali MZ, Furnell SM, Haskell-Dowland PS (Dowland PS), Reid F
Proceedings of the Fourth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2008), Wrexham, UK, ISBN: 978-1-84102-196-6, pp11-20, 2008
Can be ordered on-line.
More details

Web-based Plankton Data Visualisation
Aung TY, Haskell-Dowland PS (Dowland PS)
Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp173-181, 2007
Can be ordered on-line.
More details

Information Security Awareness & Training
Al-Ghatam H, Haskell-Dowland PS (Dowland PS)
Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp157-163, 2007
Can be ordered on-line.
More details

A guide for small and medium enterprise of implementing security and firewall system
Zhang R, Haskell-Dowland PS (Dowland PS)
Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp146-153, 2007
Can be ordered on-line.
More details

VoIP Security Threats and Vulnerabilities
Rizvi SMA, Haskell-Dowland PS (Dowland PS)
Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp114-122, 2007
Can be ordered on-line.
More details

The Art of Network Monitoring
Mohyuddin A, Haskell-Dowland PS (Dowland PS)
Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp100-105, 2007
Can be ordered on-line.
More details

Implementing Network Monitoring Tools
Asiwe VC, Haskell-Dowland PS (Dowland PS)
Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp3-10, 2007
Can be ordered on-line.
More details

Social Engineering: A growing threat, with diverging directions
Chelleth JV, Furnell SM, Papadaki M, Pinkney G, Haskell-Dowland PS (Dowland PS)
Advances in Network & Communication Engineering 3, pp179-184, 2006
Can be ordered on-line.
More details

Security and Risk Analysis of VoIP Networks
Feroz S, Haskell-Dowland PS (Dowland PS)
Advances in Network & Communication Engineering 3, pp83-89, 2006
Can be ordered on-line.
More details

Implementing a network operations centre management console: Netmates
Bali R, Haskell-Dowland PS (Dowland PS)
Advances in Network & Communication Engineering 3, pp75-82, 2006
Can be ordered on-line.
More details

Design of an Architecture for Wireless Community Networks
Perry A, Haskell-Dowland PS (Dowland PS)
Advances in Network & Communication Engineering 2, pp93-101, 2005
More details

Approaches to Establishing IT Security Culture
Langue C, Furnell SM, Haskell-Dowland PS (Dowland PS)
Advances in Network & Communication Engineering 2, pp43-48, 2005
More details

Passimages : An Alternative Method of User Authentication
Charruau D, Furnell SM, Haskell-Dowland PS (Dowland PS)
Advances in Network & Communication Engineering 2, pp3-10, 2005
More details

Security Analysis Tools - Do They Make Any Difference?
Bolakis S, Furnell SM, Haskell-Dowland PS (Dowland PS)
Advances in Network & Communication Engineering, pp29-37, 2004
More details

29 Internal publications

Other publications

How risky is it to give card details over the phone and how do I reduce the chance of fraud?
Haskell-Dowland PS (Dowland PS), Vasileiou I
The Conversation, 23 November, 2023
More details | External link available

What is LockBit, the cybercrime gang hacking some of the world’s largest organisations?
Medbury J, Haskell-Dowland PS (Dowland PS)
The Conversation, 17 November, 2023
More details | External link available

Has the cyberattack on DP World put Australia’s trade at risk? Probably not … this time
Macau F, Haskell-Dowland PS (Dowland PS)
The Conversation, 13 November, 2023
More details | External link available

Optus blackout explained: what is a ‘deep network’ outage and what may have caused it?
Haskell-Dowland PS (Dowland PS), Gregory MA, Ahmed M
The Conversation, 8 November, 2023
More details | External link available

Most data lives in the cloud. What if it lived under the sea?
Haskell-Dowland PS (Dowland PS), McMahon K
The Conversation, 27 October, 2023
More details | External link available

Meta just copped a A$1.9bn fine for keeping EU data in the US. But why should users care where data are stored?
Haskell-Dowland PS (Dowland PS)
The Conversation, 24 May, 2023
More details | External link available

A cancer centre is the latest victim of cyber attacks. Why health data hacks keep happening
Ahmed M, Haskell-Dowland PS (Dowland PS)
The Conversation, 8 May, 2023
More details | External link available

Google and Microsoft are bringing AI to Word, Excel, Gmail and more. It could boost productivity for us – and cybercriminals
Ahmed M, Haskell-Dowland PS (Dowland PS)
The Conversation, 21st March, 2023
More details | External link available

Big Tech is firing employees by the thousands. Why? And how worried should we be?
Collins N, Volkheimer J, Haskell-Dowland PS (Dowland PS)
The Conversation, 25th January, 2023
More details | External link available

Why Alexa is not your friend
Collins N, Volkheimer J, Haskell-Dowland PS (Dowland PS)
Information Age, 11 January, 2023
More details | External link available

Medibank won’t pay hackers ransom. Is it the right choice?
Ahmed M, Haskell-Dowland PS (Dowland PS)
The Conversation, 8th November, 2022
More details | External link available

Apple’s PassKeys update could make traditional passwords obsolete
Haskell-Dowland PS (Dowland PS), Furnell SM
The Conversation, 12th September, 2022
More details | External link available

iRobot’s Roomba will soon be owned by Amazon, which raises privacy questions
Haskell-Dowland PS (Dowland PS)
The Conversation, 9th August, 2022
More details | External link available

Today’s Google outage was brief but disconcerting
Haskell-Dowland PS (Dowland PS)
The Conversation, 9th August, 2022
More details | External link available

Amazon just took over a primary healthcare company for a lot of money. Should we be worried?
Ahmed M, Haskell-Dowland PS (Dowland PS)
The Conversation, 27th July, 2022
More details | External link available

5 big trends in Australians getting scammed
Haskell-Dowland PS (Dowland PS)
The Conversation, 7th July, 2022
More details | External link available

The iPhone turns 15: a look at the past (and future) of one of the 21st century’s most influential devices
Vasileiou I, Haskell-Dowland PS (Dowland PS)
The Conversation, 29th June, 2022
More details | External link available

Goodbye Internet Explorer. You won’t be missed (but your legacy will be remembered)
Ahmed M, Malik I, Haskell-Dowland PS (Dowland PS)
The Conversation, 16th June, 2022
More details | External link available

Budget 2022: $9.9 billion towards cyber security aims to make Australia a key ‘offensive’ cyber player
Haskell-Dowland PS (Dowland PS)
The Conversation, 30th March, 2022
More details | External link available

Is Russia really about to cut itself off from the internet? And what can we expect if it does?
Ahmed M, Haskell-Dowland PS (Dowland PS)
The Conversation, 10th March, 2022
More details | External link available

The hacker group Anonymous has waged a cyber war against Russia. How effective could they actually be?
Medbury J, Haskell-Dowland PS (Dowland PS)
The Conversation, 1st March, 2022
More details | External link available

As Russia wages cyber war against Ukraine, here’s how Australia (and the rest of the world) could suffer collateral damage
Haskell-Dowland PS (Dowland PS)
The Conversation, 25th February, 2022
More details | External link available

This New Year, why not resolve to ditch your dodgy old passwords?
Haskell-Dowland PS (Dowland PS), Cranor L
The Conversation, 3rd January, 2022
More details | External link available

500,000 or 20,000? How to estimate the size of a political rally properly
Abu-Khalaf J, Haskell-Dowland PS (Dowland PS)
The Conversation, 1st December, 2021
More details | External link available

Facebook wants AI to find your keys and understand your conversations
Abu-Khalaf J, Haskell-Dowland PS (Dowland PS)
The Conversation, 21st October, 2021
More details | External link available

Being bombarded with delivery and post office text scams? Here’s why — and what can be done
Vasileiou I, Haskell-Dowland PS (Dowland PS)
The Conversation, 22nd September, 2021
More details | External link available

‘What is my IP address?’ Explaining one of the world’s most Googled questions
Haskell-Dowland PS (Dowland PS), Ghita BV
The Conversation, 15th September, 2021
More details | External link available

Is Google getting worse? Increased advertising and algorithm changes may make it harder to find what you’re looking for
Ahmed M, Haskell-Dowland PS (Dowland PS)
The Conversation, 1st September, 2021
More details | External link available

How does the Pegasus spyware work, and is my phone at risk?
Haskell-Dowland PS (Dowland PS), Musotto R
The Conversation, 21st July, 2021
More details | External link available

Is Australia a sitting duck for ransomware attacks? Yes, and the danger has been growing for 30 years
Haskell-Dowland PS (Dowland PS), Woodward A
The Conversation, 14th July, 2021
More details | External link available

Holding the world to ransom: the top 5 most dangerous criminal organisations online right now
Musotto R, O'Shea B, Haskell-Dowland PS (Dowland PS)
The Conversation, 7th July, 2021
More details | External link available

Cyber Cold War? The US and Russia talk tough, but only diplomacy will ease the threat
Ibrahim A, Haskell-Dowland PS (Dowland PS)
The Conversation, 25th June, 2021
More details | External link available

‘We have filed a case under your name’: beware of tax scams — they’ll be everywhere this EOFY
Haskell-Dowland PS (Dowland PS), Collins N
The Conversation, 18 June, 2021
More details | External link available

How rain, wind, heat and other heavy weather can affect your internet connection
Kang J, Haskell-Dowland PS (Dowland PS)
The Conversation, 10 June, 2021
More details | External link available

Fastly global internet outage: why did so many sites go down — and what is a CDN, anyway?
Haskell-Dowland PS (Dowland PS)
The Conversation, 8 June, 2021
More details | External link available

What is ‘Other’ in my iPhone storage, why is it taking up so much space and how do I clear it?
Haskell-Dowland PS (Dowland PS), Szewczyk P
The Conversation, 26 May, 2021
More details | External link available

Remember, Apple AirTags and ‘Find My’ app only work because of a vast, largely covert tracking network
Haskell-Dowland PS (Dowland PS)
The Conversation, 17 May, 2021
More details | External link available

Apple’s new ‘app tracking transparency’ has angered Facebook. How does it work, what’s all the fuss about, and should you use it?
Haskell-Dowland PS (Dowland PS), Hampton N
The Conversation, 28 April, 2021
More details | External link available

Facebook data breach: what happened and why it’s hard to know if your data was leaked
Haskell-Dowland PS (Dowland PS)
The Conversation, 6 April, 2021
More details | External link available

Holding the news to ransom? What we know so far about the Channel 9 cyber attack
Haskell-Dowland PS (Dowland PS)
The Conversation, 30th March, 2021
More details | External link available

How to encourage cyber-safe behaviour at work without becoming the office grouch
Collins N, Volkheimer J, Haskell-Dowland PS (Dowland PS)
The Conversation, 26 February, 2021
More details | External link available

The Christmas gifts that keep giving (your data away) — and how to prevent this
Haskell-Dowland PS (Dowland PS), Furnell SM
The Conversation, 5th January, 2021
More details | External link available

Australian hospitals are under constant cyber attack. The consequences could be deadly
Haskell-Dowland PS (Dowland PS)
The Conversation, 18th November, 2020
More details | External link available

Robot take the wheel: Waymo has launched a self-driving taxi service
Kang J, Ahmed M, Haskell-Dowland PS (Dowland PS)
The Conversation, 15th October, 2020
More details | External link available

Airports, ATMs, hospitals: Microsoft Windows XP leak would be less of an issue, if so many didn’t use it
O'Shea B, Haskell-Dowland PS (Dowland PS)
The Conversation, 30th September, 2020
More details | External link available

Trump’s TikTok deal explained: who is Oracle? Why Walmart? And what does it mean for our data?
Haskell-Dowland PS (Dowland PS), Collins N
The Conversation, 22nd September, 2020
More details | External link available

A computer can guess more than 100,000,000,000 passwords per second. Still think yours is secure?
Haskell-Dowland PS (Dowland PS), O'Shea B
The Conversation, 15th September, 2020
More details | External link available

A storm in a TikTok
Haskell-Dowland PS (Dowland PS)
East Asia Forum, 30 August, 2020
More details | External link available

Face masks and facial recognition will both be common in the future. How will they co-exist?
Haskell-Dowland PS (Dowland PS)
The Conversation, 7th September, 2020
More details | External link available

Microsoft's takeover would be a win for TikTok and tech giants – not users
Haskell-Dowland PS (Dowland PS), O'Shea B
The Conversation, 3rd August, 2020
More details | External link available

China could be using TikTok to spy on Australians, but banning it isn’t a simple fix
Haskell-Dowland PS (Dowland PS), Kang J
The Conversation, 8 July, 2020
More details | External link available

How safe is COVIDSafe? What you should know about the app's issues, and Bluetooth-related risks
Kang J, Haskell-Dowland PS (Dowland PS)
The Conversation, 7 May, 2020
More details | External link available

ANU will invigilate exams using remote software, and many students are unhappy
Haskell-Dowland PS (Dowland PS)
The Conversation, 24 April, 2020
More details | External link available

Cyber threats at home: how to keep kids safe while they’re learning online
Haskell-Dowland PS (Dowland PS), Vasileiou I
The Conversation, 24 April, 2020
More details | External link available

Crashing the party: beware the cyber risks of virtual meet-up apps like Houseparty
Ahmed M, Haskell-Dowland PS (Dowland PS)
The Conversation, 15 April, 2020
More details | External link available

How to boost your internet speed when everyone is working from home
Kang J, Haskell-Dowland PS (Dowland PS)
The Conversation, 2 April, 2020
More details | External link available

Restricting underage access to porn and gambling sites: a good idea, but technically tricky
Haskell-Dowland PS (Dowland PS)
The Conversation, 10 March, 2020
More details | External link available

Don't die wondering: apps may soon be able to predict your life expectancy, but do you want to know?
Kang J, Haskell-Dowland PS (Dowland PS)
The Conversation, 16 January, 2020
More details | External link available

Aerial threat: why drone hacking could be bad news for the military
Ahmed M, Haskell-Dowland PS (Dowland PS)
The Conversation, 8 October, 2019
More details | External link available

PayID data breaches show Australia’s banks need to be more vigilant to hacking
Haskell-Dowland PS (Dowland PS)
The Conversation, 18 September, 2019
More details | External link available

Apple iPhones could have been hacked for years – here’s what to do about it
Sikos L, Haskell-Dowland PS (Dowland PS)
The Conversation, 5 September, 2019
More details | External link available

Three ways the "NotPetya" cyberattack is more complex than WannaCry
Haskell-Dowland PS (Dowland PS)
The Conversation, 30th June, 2017
More details | External link available

Using student analytics to improve the student experience and underpin success at university
Haskell-Dowland PS (Dowland PS)
Professionals in International Education, June 27, 2014
More details | External link available

Adapting to analytics
Haskell-Dowland PS (Dowland PS)
Education Technology & Wildfire Comms, 2 June 2014, 2014
More details | External link available

Collecting data on students: is it useful to know which books they've read?
Haskell-Dowland PS (Dowland PS)
The Guardian Higher Education Network , 29 April 2014, 2014
More details | External link available

65 Other publications

236 publication(s) - all categories.

Recent articles from "The Conversation"

Read more of my articles at The Conversation.

  • How risky is it to give card details over the phone and how do I reduce the chance of fraud?
    Paul Haskell-Dowland, Edith Cowan University and Ismini Vasileiou, De Montfort University, November 23, 2023
    It’s legal for a merchant to get your card details over the phone – but it can still be risky. Here’s what you need to know to stay safe.
    View on website
  • What is LockBit, the cybercrime gang hacking some of the world’s largest organisations?
    Jennifer Medbury, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University, November 17, 2023
    Prolific and highly profitable, LockBit provides ransomware as a service. Aspiring cybercriminals sign up to the scheme, and the group takes a cut. Here’s how it works.
    View on website
  • Has the cyberattack on DP World put Australia’s trade at risk? Probably not … this time
    Flavio Macau, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University, November 13, 2023
    A cyberattack on one of Australia’s biggest port operators has highlighted the potential vulnerability of the global economy.
    View on website
  • Optus blackout explained: what is a ‘deep network’ outage and what may have caused it?
    Paul Haskell-Dowland, Edith Cowan University; Mark A Gregory, RMIT University, and Mohiuddin Ahmed, Edith Cowan University, November 8, 2023
    Optus suffered one of the largest telecommunications outages in Australian history today. Here are the factors that can cause such events.
    View on website
  • Most data lives in the cloud. What if it lived under the sea?
    Paul Haskell-Dowland, Edith Cowan University and Kathryn McMahon, Edith Cowan University, October 27, 2023
    Could the data centres that power the internet be moved to the bottom of the ocean? It’s not as crazy as it sounds
    View on website
  • Meta just copped a A$1.9bn fine for keeping EU data in the US. But why should users care where data are stored?
    Paul Haskell-Dowland, Edith Cowan University, May 24, 2023
    Meta now faces some A$4 billion in fines related to breaches of the European Union’s General Data Protection Regulations.
    View on website
  • A cancer centre is the latest victim of cyber attacks. Why health data hacks keep happening
    Mohiuddin Ahmed, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University, May 8, 2023
    While some cyber criminals have previously avoided schools and health-care organisations, it seems these are now fair game.
    View on website
  • Google and Microsoft are bringing AI to Word, Excel, Gmail and more. It could boost productivity for us – and cybercriminals
    Mohiuddin Ahmed, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University, March 21, 2023
    The new tools are expected to free up space for workers by helping out with tedious and repetitive task. Here’s how it will work.
    View on website
  • Big Tech is firing employees by the thousands. Why? And how worried should we be?
    Nathalie Collins, Edith Cowan University; Jeff Volkheimer, Duke University, and Paul Haskell-Dowland, Edith Cowan University , January 25, 2023
    The numbers are less concerning when viewed in the bigger picture.
    View on website
  • Medibank won’t pay hackers ransom. Is it the right choice?
    Mohiuddin Ahmed, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University, November 8, 2022
    A well-known cybercrime group has threatened to release the data should the ransom not be paid.
    View on website
  • Apple’s PassKeys update could make traditional passwords obsolete
    Paul Haskell-Dowland, Edith Cowan University and Steven Furnell, University of Nottingham, September 12, 2022
    The advice for years has been to use password managers. But even these don’t completely eliminate the risk of being compromised.
    View on website
  • iRobot’s Roomba will soon be owned by Amazon, which raises privacy questions
    Paul Haskell-Dowland, Edith Cowan University, August 9, 2022
    In the development of ever smarter homes, Amazon could soon have access to the maps of our houses created and stored by Roomba vacuums.
    View on website
  • Today’s Google outage was brief but disconcerting
    Paul Haskell-Dowland, Edith Cowan University, August 9, 2022
    Google’s brief disappearance from the internet felt, for many, like an almost-apocalyptic moment
    View on website
  • Amazon just took over a primary healthcare company for a lot of money. Should we be worried?
    Mohiuddin Ahmed, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University, July 27, 2022
    One Medical provides primary healthcare services to people across the US.
    View on website
  • 5 big trends in Australians getting scammed
    Paul Haskell-Dowland, Edith Cowan University, July 7, 2022
    Scam techniques that rely on human nature are increasingly being executed via technology. Here are five that recorded big increases in 2021.
    View on website
  • The iPhone turns 15: a look at the past (and future) of one of the 21st century’s most influential devices
    Ismini Vasileiou, De Montfort University and Paul Haskell-Dowland, Edith Cowan University , June 29, 2022
    Despite its ‘innovator’ status, Apple usually wasn’t the first one to offer groundbreaking new features. But it knew how to adopt existing features in groundbreaking ways.
    View on website

  • Goodbye Internet Explorer. You won’t be missed (but your legacy will be remembered)

    Mohiuddin Ahmed, Edith Cowan University; M Imran Malik, Edith Cowan University, and Paul Haskell-Dowland, Edith Cowan University, June 16, 2022
    Explorer came at the dawn of the public internet. For millions of people, it will always be their first experience of the World Wide Web.
    View on website
  • Budget 2022: $9.9 billion towards cyber security aims to make Australia a key ‘offensive’ cyber player
    Paul Haskell-Dowland, Edith Cowan University, March 30, 2022
    The funds are allocated across a ten-year period, with most of the money redirected from defence spending.
    View on website
  • Is Russia really about to cut itself off from the internet? And what can we expect if it does?
    Mohiuddin Ahmed, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University, March 10, 2022
    The Kremlin is pushing for a quick migration of all Russian websites and services to be hosted within the country. It could be the first stage of a larger disconnection.
    View on website
  • The hacker group Anonymous has waged a cyber war against Russia. How effective could they actually be?
    Jennifer Medbury, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University, March 1, 2022
    There’s an alleged global network of cyber activists operating under the Anonymous name. Knowing who is responsible for what will become increasingly difficult as more cyber attacks happen.
    View on website
  • As Russia wages cyber war against Ukraine, here’s how Australia (and the rest of the world) could suffer collateral damage
    Paul Haskell-Dowland, Edith Cowan University, February 25, 2022
    These days sophisticated malware can spread like wildfire, thanks to transnational businesses and organisations providing bridges across countries.
    View on website
  • This New Year, why not resolve to ditch your dodgy old passwords?
    Paul Haskell-Dowland, Edith Cowan University and Lorrie Cranor, Carnegie Mellon University, January 3, 2022
    Start 2022 by improving your password hygiene. Ideally you can use a password manager, but at the very least make sure your financial, social and work accounts each has their own strong, unique login.
    View on website
  • 500,000 or 20,000? How to estimate the size of a political rally properly
    Jumana Abu-Khalaf, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University, December 1, 2021
    Image recognition algorithms, military satellites, and mobile data networks can all help estimate crowd sizes. But the underlying maths still comes down to a basic formula: density multiplied by area.
    View on website
  • Facebook wants AI to find your keys and understand your conversations
    Jumana Abu-Khalaf, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University, October 21, 2021
    Facebook’s Ego4D project will help computers see the world from your point of view - for better or worse.
    View on website
  • Being bombarded with delivery and post office text scams? Here’s why — and what can be done
    Ismini Vasileiou, De Montfort University and Paul Haskell-Dowland, Edith Cowan University, September 22, 2021
    Australians are being bombarded with ‘missed parcel’ SMS messages that aren’t as they seem…
    View on website
  • ‘What is my IP address?’ Explaining one of the world’s most Googled questions
    Paul Haskell-Dowland, Edith Cowan University and Bogdan Ghita, University of Plymouth, September 15, 2021
    IP addresses serve a similar function to postal addresses. Postal addresses allow our mail to circulate, while IP addresses allow network traffic to move around the internet.
    View on website
  • Is Google getting worse? Increased advertising and algorithm changes may make it harder to find what you’re looking for
    Mohiuddin Ahmed, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University, September 1, 2021
    More advertising and “smarter” search algorithms are changing how Googling works.
    View on website
  • How does the Pegasus spyware work, and is my phone at risk?
    Paul Haskell-Dowland, Edith Cowan University and Roberto Musotto, Edith Cowan University, July 21, 2021
    It's reported the Pegasus spyware can capture a user's keystrokes, intercept communications, track their device and tap into their camera and microphone.
    View on website
  • Is Australia a sitting duck for ransomware attacks? Yes, and the danger has been growing for 30 years
    Paul Haskell-Dowland, Edith Cowan University and Andrew Woodward, Edith Cowan University, July 14, 2021
    The first ransomware attack, in 1988, was a crude effort involving virus-laden floppy disks. But in the decades since, the sophistication of malware, and the money reaped by criminals, has skyrocketed.
    View on website
  • Holding the world to ransom: the top 5 most dangerous criminal organisations online right now
    Roberto Musotto, Edith Cowan University; Brianna O'Shea, Edith Cowan University, and Paul Haskell-Dowland, Edith Cowan University, July 7, 2021
    The recent attack on software supplier Kaseya has been labelled as the biggest global ransomware attack on record.
    View on website
  • Cyber Cold War? The US and Russia talk tough, but only diplomacy will ease the threat
    Ahmed Ibrahim, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University, June 25, 2021
    At this month's summit, US President Joe Biden warned his counterpart Vladimir Putin of reprisals against 'persistent malicious cyber-attacks'. But it will take more than posturing to end the stand-off.
    View on website
  • ‘We have filed a case under your name’: beware of tax scams — they’ll be everywhere this EOFY
    Paul Haskell-Dowland, Edith Cowan University and Nathalie Collins, Edith Cowan University, June 18, 2021
    As winter draws in, Australians don't just have to prepare for tax time — they must also be on the watch for scams.
    View on website
  • How rain, wind, heat and other heavy weather can affect your internet connection
    James Jin Kang, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University, June 10, 2021
    When the weather gets wild, your internet connection can suffer. But other users are as much to blame as the wind and rain
    View on website
  • Fastly global internet outage: why did so many sites go down — and what is a CDN, anyway?
    Paul Haskell-Dowland, Edith Cowan University, June 8, 2021
    To understand what happened, you need to know what a CDN (content delivery network) is, and how crucial they are to the smooth running of the internet.
    View on website
  • What is ‘Other’ in my iPhone storage, why is it taking up so much space and how do I clear it?
    Paul Haskell-Dowland, Edith Cowan University and Patryk Szewczyk, Edith Cowan University, May 26, 2021
    The most effective solution is also the most radical.
    View on website
  • Remember, Apple AirTags and ‘Find My’ app only work because of a vast, largely covert tracking network
    Paul Haskell-Dowland, Edith Cowan University, May 17, 2021
    AirTags promise to help find your lost wallet or bag. But at worst, they could be used for stalking, and at best they involve signing up to a global tracking network most users aren't truly aware of.
    View on website
  • Apple’s new ‘app tracking transparency’ has angered Facebook. How does it work, what’s all the fuss about, and should you use it?
    Paul Haskell-Dowland, Edith Cowan University and Nikolai Hampton, Edith Cowan University, April 28, 2021
    Apple's latest iPhone operating system lets you opt out of having your online habits tracked by the apps you use. That's a big part of Facebook's business model, but don't expect a privacy revolution.
    View on website
  • Facebook data breach: what happened and why it's hard to know if your data was leaked
    Paul Haskell-Dowland, Edith Cowan University, April 6, 2021
    More than 500 million people's details were compromised. The records include various combinations of name, email, gender, date of birth, location, relationship status and employer.
    View on website
  • Holding the news to ransom? What we know so far about the Channel 9 cyber attack
    Paul Haskell-Dowland, Edith Cowan University, March 30, 2021
    It's still too early to say who attacked Channel Nine, disrupting its live broadcasts over the weekend. But fingers have been pointed at Russian state actors using a tactic nicknamed 'wiperware'.
    View on website
  • How to encourage cyber-safe behaviour at work without becoming the office grouch
    Nathalie Collins, Edith Cowan University; Jeff Volkheimer, Duke University, and Paul Haskell-Dowland, Edith Cowan University, February 26, 2021
    If you're reluctant to share your password, or broadcast a team password in Slack in a groupchat, your instincts are correct. But mocking those who 'do the wrong thing' is unlikely to help.
    View on website
  • The Christmas gifts that keep giving (your data away) — and how to prevent this
    Paul Haskell-Dowland, Edith Cowan University and Steven Furnell, University of Nottingham, January 5, 2021
    Many of us will have received new gadgets this festive season. But how can we ensure these are set up safely? And what's the best way to discard of old devices being replaced?
    View on website
  • Australian hospitals are under constant cyber attack. The consequences could be deadly
    Paul Haskell-Dowland, Edith Cowan University, November 18, 2020
    Cyberattacks on Australian healthcare facilities are on the rise.
    View on website
  • Robot take the wheel: Waymo has launched a self-driving taxi service
    James Jin Kang, Edith Cowan University; Mohiuddin Ahmed, Edith Cowan University, and Paul Haskell-Dowland, Edith Cowan University, October 15, 2020
    The age of autonomous vehicles is edging closer to reality with the launch of a driverless taxi service in the USA.
    View on website
  • Airports, ATMs, hospitals: Microsoft Windows XP leak would be less of an issue, if so many didn’t use it
    Brianna O'Shea, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University, September 30, 2020
    The outdated Microsoft operating system was recently dumped online in a huge leak. Hackers can now scour it for bugs to exploit.
    View on website
  • Trump’s TikTok deal explained: who is Oracle? Why Walmart? And what does it mean for our data?
    Paul Haskell-Dowland, Edith Cowan University and Nathalie Collins, Edith Cowan University, September 22, 2020
    Plot twists in the TikTok saga continue to emerge daily, with a proposed deal to secure its future in the US now in doubt. Here's what it means for TikTok users — and for geopolitics.
    View on website
  • A computer can guess more than 100,000,000,000 passwords per second. Still think yours is secure?
    Paul Haskell-Dowland, Edith Cowan University and Brianna O'Shea, Edith Cowan University, September 15, 2020
    One website dedicated to tracking stolen passwords suggests there are details of currently more than 10 billion compromised accounts available online.
    View on website
  • Face masks and facial recognition will both be common in the future. How will they co-exist?
    Paul Haskell-Dowland, Edith Cowan University, September 7, 2020
    With face masks now compulsory or recommended in various parts of the country, how are facial recognition systems functioning?
    View on website
  • Microsoft’s takeover would be a win for TikTok and tech giants – not users
    Paul Haskell-Dowland, Edith Cowan University and Brianna O'Shea, Edith Cowan University, August 3, 2020
    If a new deal between Microsoft and ByteDance goes through, the Chinese company may withdraw ownership of its TikTok operations in not only the US – but also Australia, New Zealand and Canada.
    View on website
  • China could be using TikTok to spy on Australians, but banning it isn’t a simple fix
    Paul Haskell-Dowland, Edith Cowan University and James Jin Kang, Edith Cowan University, July 8, 2020
    The US is also 'looking at' banning the Chinese social media app.
    View on website
  • How safe is COVIDSafe? What you should know about the app’s issues, and Bluetooth-related risks
    James Jin Kang, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University, May 7, 2020
    From conflicts with specialised medical devices, through to unresolved problems with iPhone functionality, COVIDSafe is in need of updates. A major one may come within the next few weeks.
    View on website
  • ANU will invigilate exams using remote software, and many students are unhappy
    Paul Haskell-Dowland, Edith Cowan University, April 24, 2020
    The Australian National University is turning to digital proctoring to replace the role of a walking invigilator. But who watches the proctor, what are the risks, and what data will be collected?
    View on website
  • Cyber threats at home: how to keep kids safe while they’re learning online
    Paul Haskell-Dowland, Edith Cowan University and Ismini Vasileiou, De Montfort University, April 24, 2020
    Just as office workers need to be aware of cyber risks when setting up a home office, parents need to think about the increased exposure their children will face
    View on website
  • Crashing the party: beware the cyber risks of virtual meet-up apps like Houseparty
    Mohiuddin Ahmed, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University, April 15, 2020
    Apps like Houseparty and Netflix Party are helping people stay in touch with friends - but do these apps have cyber dangers that we need to be aware of?
    View on website
  • How to boost your internet speed when everyone is working from home
    James Jin Kang, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University, April 2, 2020
    Your mobile internet bandwidth is shared with others in your area. That's why many people trying to access the iternet at the same time results in slower speeds.
    View on website
  • Restricting underage access to porn and gambling sites: a good idea, but technically tricky
    Paul Haskell-Dowland, Edith Cowan University, March 10, 2020
    Accessing gambling and pornography sites may well get harder in Australia, if plans for mandatory age-verification go ahead. But there are already technical workarounds for determined web users.
    View on website
  • Don’t die wondering: apps may soon be able to predict your life expectancy, but do you want to know?
    James Jin Kang, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University, January 16, 2020
    Predicting life expectancy remains in the realm of science fiction, but it may soon be possible. Are we prepared for such information? And who else would benefit
    View on website
  • Aerial threat: why drone hacking could be bad news for the military
    Mohiuddin Ahmed, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University, October 8, 2019
    Drones are now an integral part of defence force capability, from intelligence gathering to unmanned theatre engagement. But what happens if our own technology is turned against us?
    View on website
  • PayID data breaches show Australia’s banks need to be more vigilant to hacking
    Paul Haskell-Dowland, Edith Cowan University, September 18, 2019
    PayID has been misused and compromised in various ways since its 2018 launch. The system deals only in "incoming" payments, not outgoing ones – but that doesn't mean users are safe from cyber crime.
    View on website
  • Apple iPhones could have been hacked for years – here’s what to do about it
    Leslie Sikos, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University, September 5, 2019
    The news that malware can invade iPhones and other Apple devices via the Safari web browser has damaged Apple's reputation for security. But you can fix the problem by updating your phone's software.
    View on website
  • Three ways the ‘NotPetya’ cyberattack is more complex than WannaCry
    Paul Haskell-Dowland, Edith Cowan University, June 30, 2017
    Mayhem, not money, seems to be the ultimate aim of the latest attack unleashed on computer networks around the world.
    View on website

Randomly selected article from "The Conversation"

  • Being bombarded with delivery and post office text scams? Here’s why — and what can be done

    ScamWatch
    Ismini Vasileiou, De Montfort University and Paul Haskell-Dowland, Edith Cowan University

    For most people, the ping of an incoming SMS will induce some level of excitement — or mild intrigue at least. But with SMS scams on the rise, many may now be meeting this same sound with trepidation.

    According to the Australian Competition and Consumer Commission’s (ACCC) ScamWatch website, scams delivered via “phone” or “text” this year far outnumber those sent through any other delivery method, including social media or email.

    Delivery and postal scams are particularly common in SMS scam campaigns, with Australia Post even hosting a dedicated scam alerts page on its website. Other forms of fraud encountered via SMS include premium-rate text fraud, tax demands, fake contact-tracing messages and smishing (SMS phishing).

    While eliminating the threat might be difficult, there are some simple ways you can avoid becoming the next victim.

    A growing global problem

    SMS scams have seen considerable growth in the last few years. ScamWatch reported a near-doubling of yearly losses between last year (A$3,091,790 lost) and this year, as of August (A$5,889,596). SMS scam reports have also shot up to a total 39,531 reports this year as of August — up from last year’s total of 32,337.

    Of particular concern is the escalation in cost per incident (total reported losses divided by number of incidents), indicating a significant shift in the impact of these scams.

    SMS scam statistics drawn from ACCC ScamWatch data (https://www.scamwatch.gov.au/scam-statistics) - 2021 data up to August. Author provided

    This isn’t just in Australia, either. The US Federal Trade Commission reported US$86m in losses to SMS scams last year, and the UK’s Office of Communications reported a significant rise in scam messages received by UK residents.


    Read more: Why are there so many text scams all of a sudden?


    Evolving scam techniques

    Email remains the cheapest method to distribute scams. But most email services now provide efficient spam filters to block them.

    When it comes to SMS messages, however, our smartphones don’t afford the same level of protection. While telecommunication providers are enhancing their SMS scam (and spam) detection capabilities, this issue so far hasn’t received the same attention as email scam.

    Perhaps this is because of the extent of impact on consumers. Compared with email scams, it was only relatively recently that SMS scams became a problem leading to direct and highly visible financial consequences.

    Australia Post has provided guidance on avoiding postal scams targeting Australian’s.

    That said, SMS scams aren’t just limited to financial fraud. Since last month, Australian’s have been increasingly targeted with SMS messages carrying the flubot malware. This malicious software (malware) migrated from Europe to Australia, and targets Android devices with the intention of stealing online banking credentials.

    It’s delivered via SMS messages that attempt to convince the recipient they must install an “app” on their smartphone to reschedule a missed delivery or listen to a fake voicemail. Unfortunately, rather than an actual app downloaded from the app store, this fake “app” contains malware which is installed when the link in the SMS message is clicked.

    Once installed, the malware provides “overlays” (fake pages) on top of the login screens of genuine banking apps installed on the phone. So the next time the victim uses their real banking app, the overlays capture their banking details, which are then fed back to servers controlled by cyber criminals.

    This video shows the flubot overlay on an online banking app.

    The flubot malware was previously associated with the Cabassous cybercrime group in 2020, but seems to have seen a resurgence in 2021 despite multiple arrests in Spain.

    Why SMS scams are hard to stop

    Scammers often leverage real scenarios to mislead people. The COVID pandemic has forced people to work from home, take temporary leave, or get laid off altogether — prompting a surge in online shopping and more internet use overall.


    Read more: Why are there so many text scams all of a sudden?


    Scammers are taking advantage. The ACCC’s ScamWatch received 13,191 “online shopping scam” reports this year as of last month — with 35.6% of the reports claiming financial loss.

    Most malicious campaigns use a scatter-gun approach, targeting thousands of phone numbers sequentially (such as by starting with “0400 000 000” and working up), randomly (with the aim of seeming less predicatable), or using stolen lists of valid numbers.

    And while most mobile devices do have options to block or filter numbers, such as by SMS filtering services or by categorising unknown numbers — much like email scam/spam filters these approaches are only as reliable as data collected from user reports.

    If all scam messages came from a single number, it would be a simple case of blocking that number. Unfortunately, scammers use sophisticated technology to rapidly send large volumes of SMS messages, and will often generate spoofed numbers to appear legitimate or to bypass blocking by the phone’s automatic filter, or the user themselves.

    Since the scam messages are not expected to generate replies (since they only want you to click the link), they don’t even need to be real phone numbers. On the screen they may appear legitimate (such as with “DHL” appearing as the company name) or may be completely random.

    A bulk SMS sender (pictured) can generate 230,400 text messages per hour. While it can be used for legitimate text-sending applications, it can also be misused by criminals to send spam messages at scale. Author provided

    It’s evident blocking is only part of the full solution. Ideally the criminal groups behind these operations would be shut down. But as with most forms of organised crime, the culprits are often located overseas — making it difficult to investigate and prosecute for these crimes.

    Exercise caution

    Spotting scams is becoming increasingly difficult. Scammers use various techniques to trick targets, including:

    • pretending they have authority. For example, by pretending to be DHL or the tax office
    • convincing you there is limited time to respond. This can prompt panic and an urgency to respond
    • offering something of value or attraction to incite a response, such as a fake lottery win. Or threatening you with a consequence, such as a fake a penalty or fine.

    Legitimate organisations and agencies will rarely (if ever) use overly casual, hostile or threatening language in an SMS. To stay safe and alert, you must keep this in mind.

    If you ever receive a suspicious SMS message, don’t reply or click on any attached links. If the message purports to come from an official organisation, always contact the organisation directly (never trust any contact details included in the message).

    If your phone supports the option, block the number — and consider reporting it to the Australian Communications and Media Authority.

    If you’ve been compromised (or suspect it)

    If you think you have fallen victim to a scam, it’s important to remain calm.

    The first thing to do is seek advice from the relevant organisation, which in Australia is ScamWatch. If you’re concerned your banking details may have been compromised, contact your bank immediately to block any rogue transactions, prevent future transfers and change your details as necessary.

    If you have disclosed your password, you must change it immediately across all sites and services the password is used for. And if the issue is affecting a work-related device, contact your IT department to check whether your device has been compromised. This may require it to be checked for malware, cleaned and/or re-imaged.

    Finally, always ensure your mobile devices are kept up-to-date with patches and software upgrades. While this might not stop the SMS messages, you will benefit from system updates designed to protect you. The Australian Cyber Security Centre has further advice on what to do if you’ve fallen victim to a scam.The Conversation

    Ismini Vasileiou, Associate Professor in Information Systems, De Montfort University and Paul Haskell-Dowland, Associate Dean (Computing and Security), Edith Cowan University

    This article is republished from The Conversation under a Creative Commons license. Read the original article.

Editorships / refereeing for journals

Conferences organised

Other international conference activities

Current research degree supervisions

  • Mr Muhammad Afzal, Insider Threat Detection Using a Synthetic Dataset
  • Miss Nomin Chimid-Osor, Insider Threat Mitigation in Critical Infrastructure
  • Mr Vasanth Kumar, In-circuit forensic analysis of IoT memory modules
  • Mr Hammad Maqsood, Human Factor Integration within Cyber Threat Detection
  • Mr Mushtaq Saeed, Cryptography, end-to-end trust assurance and legal interception

Completed research degree supervisions

Examination of research degrees

  • Dr Liza Salleh, External Examiner, PhD thesis, University of Auckland, September 2020
  • Dr Timm Heuss, Internal Examiner, PhD thesis, December 2016
  • Dr Thomas Rübsamen, Internal Examiner, PhD thesis, November 2016
  • Dr Janet Kneller, Internal Examiner, PhD thesis, December 2015
  • Dr Sandra Frei, Internal Examiner, PhD thesis, March 2015
  • Dr Christopher Hocking, Internal Examiner, PhD thesis, December 2014
  • Dr Christopher Kosmas, Internal Examiner, PhD thesis, May 2014
  • Dr Sevasti Karatzouni, Internal Examiner, PhD thesis, February 2014
  • Dr Hataichanok Saevanee, Internal Examiner, PhD thesis, February 2014
  • Dr Karin Kronawitter, Internal Examiner, PhD thesis, January 2014
  • Dr Witold Thaul, Internal Examiner, PhD thesis, September 2013
  • Dr Mike Krey, Internal Examiner, PhD thesis, 2013
  • Dr Jan Muhammad, External Examiner, PhD thesis, University of Glasgow, October 2012
  • Dr Shuhaili Talib, Internal Examiner, PhD thesis, October 2012
  • Dr Benjamin Heckmann, Internal Examiner, PhD thesis, September 2012
  • Dr Nor Badrul Abuar Jumaat, Internal Examiner, PhD thesis, February 2012
  • Dr HaiYun Tian, External Examiner, PhD thesis, Teesside University, January 2012
  • Dr Aruna Thakur, Internal Examiner, PhD thesis, February 2007
  • Dr Nathan Luke Clarke, Internal Examiner, PhD thesis, September 2004

Invited presentations, lectures, etc.

  • Keynote Speaker, Simple Errors=Serious Consequences, IIT Madras, Chennai, India, 6th March 2024
  • Invited Speaker, Simple Errors=Serious Consequences, CERT, Colombo, Sri Lanka, 15th February 2024
  • Invited Speaker, Tracking technologies: Now everyone can be a spy, Virtusa, Colombo, Sri Lanka, 14th February 2024
  • Keynote Speaker, Simple Errors=Serious Consequences, University of Sri Jayewardenepura, Colombo, Sri Lanka, 14th February 2024
  • Invited Speaker, History of Cyber Security, Cyber West Summit 23, Perth, 10th May 2023
  • Panel Member, Business News 'The Future Of Cybersecurity' Sector Briefing, Crown Perth, 31st March 2023
  • Invited Speaker, Surveillance and Tracking, Computer Society of Sri Lanka, Colombo, Sri Lanka, 22nd February 2023
  • Keynote Speaker, The Cost of Cyber Crime, Auspire, 25th October 2022
  • Panel Member, UK Connect, Invest and Trade Western Australia, 12th August 2022
  • Keynote Speaker, Tracking technologies: From James Bond to everyone, IEEE-CSR Conference, 27-29 July 2022
  • Keynote Speaker, From TikTok to Pegasus: Communicating cyber to the masses, ECU Lecture Series, 31st May 2022
  • Keynote Speaker, Cyber security education, a perfect storm, ECUlture, ECU, 1st November 2021
  • Invited Speaker, Case study live demo, Cyber Security Asia, Malaysia, 11th October 2021
  • Invited Speaker and panel member,Cyber Security: protecting ourselves into the future?, Brand Launch, Optus Stadium, 22nd April 2021
  • Presentation, Invoice Fraud Case Study, 26th November 2020
  • Invited Speaker, What can we learn from a hack? Cyber Security Asia, Phnom Penh, Cambodia, 5th November 2019
  • Panel Member, Discovering the Digital Underworld: Privacy, the Dark Web, Tech & Democracy, Cyber Security Asia, Phnom Penh, Cambodia, 4th November 2019
  • Keynote Speaker, Lessons in Ethical Hacking, Computer Society of Sri Lanka, Colombo, Sri Lanka, 29th October 2019
  • Invited Speaker, Ethical Hacking, RSA Conference 2019, Asia Pacific and Japan, Singapore, 16th July 2019
  • Keynote Speaker, Evolving Cyber Risks for Organisations: Taking security seriously, Innovation Summit, Austrade, Cebu, Philippines, 24th May 2019
  • Keynote Speaker, Cyber Security: protecting ourselves into the future, Singapore Computer Society, Singapore, 22nd May 2019
  • Keynote Speaker, Ethical Hacking, IDP, Singapore, 11th May 2019
  • Invited Speaker, Ethical Hacking, SCS Student Chapter, Singapore, 3rd May 2019
  • Panel Moderator, WA Leaders Conference, Engineers Australia, Perth, Australia, 30th May 2018
  • Panel Member, Austrade ICT Education Showcase, Hanoi, Vietnam, 16th May 2018
  • Workshop, Ethical Hacking, IEEE/Sri Lanka CERT Cyber Security Week, Colombo, Sri Lanka, 31st August 2017
  • Keynote Speaker, Can Barbie bring down a power station?, 10th Annual National Conference on Cyber Security, Sri Lanka CERT, Colombo, Sri Lanka, 30th August 2017
  • Speaker, Cyber Security Threat Landscape, IEEE/Federation of Malaysian Manufacturers (FMM), Kuala Lumpur, Malaysia, 17th August 2017
  • Chair and Speaker, Ethical Hacking, Security Governance Workshop, CommunicAsia 2017, Singapore, 25th May 2017
  • Speaker, Security Monitoring, Internet and IPv6 Infrastructure Security, Bangkok, Thailand, 11th May 2017
  • Speaker, Practical Exploitation, Secure South West 6, Plymouth, 9th February 2016
  • Chair, Effectively Utilising Higher Education Data, Inside Government, London, 26th November 2015
  • Workshop, "Making it easier to be effective tutors - the role of S3", Vice-Chancellor's Teaching and Learning Conference, Plymouth, 26th June 2015
  • Poster, "What can S3 do for you (and your students)?", Vice-Chancellor's Teaching and Learning Conference, Plymouth, 26th June 2015
  • Presentation, South West Cyber Security Cluster: Cyber Security Survival Strategy, Exeter, 21 May 2015
  • Panel Member, Tackling student welfare issues and improving student retention, Westminster Higher Education Forum, London, 5th March 2015
  • Chair and Case Study Presentation, Higher Education Data: Redesigning the Information Landscape, Inside Government, London, 12th November 2014
  • Panel Member, Are today’s security technologies usable enough?, Secure South West 4, Plymouth, 10th July 2014
  • Panel Member, Future Challenges in Cyber Security, Secure South West 3, Plymouth, 16th December 2013
  • Masterclass, "Introduction to and demo of S3 (Student Support System)", Vice-Chancellor's Teaching and Learning Conference, Plymouth, 28th June 2013
  • Speaker, Practical IT Security and Digital Forensics techniques, Secure South West, Plymouth, 20th September 2012
  • Presentation, "Endpoint Security Case Study", Enterprise Security 2007, London, 11 October 2007
  • Invited Lecturer, IPICS Summer School, Leuven, Belgium, July 2006
  • Presentation, "Online Peer Assessment", Vice-Chancellor's Teaching and Learning Conference, Plymouth, June 2006
  • Keynote Speech, "Transparent User Authentication using Keystroke Analysis", 11th Conference on Human Computer Interaction, Oviedo, Spain, 22-24 March 2006
  • “Common Failings” and "Technical Requirements", Information Systems Security 1 Day Conference, Guernsey, 8 February 2006
  • Invited Lecturer, IPICS Winter School, Oulu, Finland, April 2004
  • Invited Lecturer, Guernsey Training Agency, Guernsey, December 2003, January 2004
  • Invited Lecturer, IPICS Summer School, Malaga, Spain, July 2003
  • Invited Lecturer, IPICS Winter School, Oulu, Finland, April 2003
  • Invited Lecturer, IPICS Summer School, Samos, Greece, July 2002

Other professional/academic activities/roles/duties

Present (Edith Cowan University, Perth, Australia):

  • Acting Dean (as required)
  • ASL Committee
  • Associate Dean (Computing and Security)
  • Curriculum, Teaching & Learning Committee
  • ERA Discipline Champion
  • Occupational Safety and Health Committee
  • Research and Research Training Committee
  • School Executive

Past (Plymouth University, Plymouth, UK):

  • Academic Regulations Sub-Committee - Faculty Representative (2012-2016)
  • Associate Head of School for Computing (2015-2016)
  • Cisco Academy Co-ordinator (2005-2016)
  • CNET Subject Group Leader (2002-2015)
  • Computer Security Incident Response Team member (2015-2016)
  • Data Centre Project Board member (2015-2016)
  • DLE Early Adopter - School Representative (2014-2015)
  • DLE User Group - Academic Representative (2015-2016)
  • DTC Committee Member - CSCAN Representative (2014-2016)
  • Enterprise Architecture Board - Academic Representative (2013-2016)
  • Faculty IT Committee - School Representative (2014-2016)
  • Faculty Plagiarism Committee - (2002-2016)
  • Fitness to Study Hearing - Chair (2014-2016)
  • HR Self Service Working Group - Academic Representative (2009-2010)
  • Industrial Liaison Advisory Committee (2009-2012)
  • Information Security Group (2015-2016)
  • Information Security Policy - Contributor (2012-2014)
  • League Table Performance Committee - S3 Representative (2015-2016)
  • Microsoft Server 2003 Migration Project Board - Academic Representative (2015-2016)
  • Research Student Data Project (2012)
  • School Executive (2009-2016)
  • School Health and Safety Committee (2015-2016)
  • SciTech Showcase - School Coordinator (2012-2016)
  • Student Marks Project Board (2011-2013)
  • Teaching Learning and Quality Committee (2011-2016)
  • University IT Committee (2015-2016)
  • Web Expenses Process Group (2009-2010)