Top of page
Global Site Navigation

School of Computer and Security Science

Local Section Navigation
You are here: Main Content

Dr Patryk Szewczyk

Dr Patryk Szewczyk


Contact Information Telephone: (61 8) 9370 6979, Email:, Campus: Joondalup, Room: JO18.338
Staff Member Details
Telephone: (61 8)  9370 6979  
Campus: Joondalup  
Room: JO18.338  


Patryk is a Lecturer in the School of Computer and Security Science and a member of the ECU Security Research Institute.

Current Teaching

  • Computer Security
  • Computer Forensics
  • IT Security Management

Professional Associations

  • Australian Computer Society
  • Australian Information Security Association
  • Australian and New Zealand Forensic Science Society

Awards and Recognition

National and International Awards

  • 2011 WAITTA Winner - Service Delivery & Training
  • 2010 WAITTA Finalist - Security


  • 2015 Best Paper Award - Australian Information Security Management Conference
  • 2009 Best Paper Award - Australian Digital Forensics Conference

Research Areas and Interests

  • ADSL router forensics, embedded system forensic, consumer electronic forensics
  • End-user security awareness, security education, security perceptions, usability of security products


  • PhD (Doctoral Degree), Edith Cowan University, 2015.
  • BScHons (Bachelor of Science Honours), Edith Cowan University, 2006.
  • BSc (Bachelor of Science), Edith Cowan University, 2005.

Recent Publications (within the last five years)

Journal Articles

  • Szewczyk, P., (2012), An Australian Perspective on the Challenges for Computer and Network Security for Novice End-Users. Journal of Digital Forensics, Security and Law, 7(4), 51-72, Metropolitan State University, Minnesota, USA.
  • Szewczyk, P., (2011), Analysis of Data Remaining on Second Hand ADSL Routers. Journal of Digital Forensics, Security and Law, 6(3), 17-30, Virginia.

Conference Publications

  • Blackman, D., Szewczyk, P., (2015), The challenges of seizing and searching the contents of wi-fi devices for the modern investigator. Proceedings of the 13th Australian Digital Forensics Conference, 37-48.
  • Hampton, N., Szewczyk, P., (2015), A survey and method for analysing SoHo router firmware currency. Proceedings of the 13th Australian Information Security Management Conference, 11-27.
  • El-Abed, J., Szewczyk, P., (2014), Persistent issues in encryption software: A heuristic and cognitive walkthrough. Proceedings of the 12th Australian Information Security Management Conference, 64-74, Perth, W.A..
  • Szewczyk, P., (2013), Usability and security support offered through ADSL router user manuals. The Proceedings of 11th Australian Information Security Management Conference, 93-101, Joondalup, WA.
  • Szewczyk, P., Robins, N., Sansurooah, K., (2013), Sellers continue to give away confidential information on second hand memory cards sold in Australia. The Proceedings of 11th Australian Digital Forensics Conference, 135-140, Joondalup, WA.
  • Szewczyk, P., Sansurooah, K., (2012), The 2012 Investigation into Remnant Data on Second Hand Memory Cards Sold in Australia. The Proceedings of the 10th Australian Digital Forensics Conference, 41-46, Edith Cowan University, Perth, Western Australia.
  • Szewczyk, P., (2012), A Survey of Computer and Network Security Support from Computer Retailers to Consumers in Australia. The Proceedings of the 10th Australian Information Security Management Conference, 111-117, Edith Cowan University Perth, Western Australia.
  • Sansurooah, K., Szewczyk, P., (2012), A study of remnant data found on USB storage devices offered for sale on the Australian second hand market in 2011. Proceedings of the 10th Australian Information Security Management Conference, 83-91, Perth, Western Australia.
  • Cook, D., Szewczyk, P., Sansurooah, K., (2011), Seniors Language Paradigms: 21st Century Jargon and the Impact on Computer Security and Financial Transactions for Senior Citizens. Proceedings of the 9th Australian Information Security Management Conference, 63-68, Perth, Western Australia .
  • Szewczyk, P., Sansurooah, K., (2011), A 2011 investigation into remnant data on second hand memory cards sold in Australia. Proceedings of the 9th Australian Digital Forensics Conference, 134-138, Perth, Western Australia.
  • Barker, J., Hannay, P., Szewczyk, P., (2011), Using traffic analysis to identify The Second Generation Onion Router. Proceedings: 2011 Ninth IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, 72-78, Piscataway, NJ.
  • Cook, D., Szewczyk, P., Sansurooah, K., (2011), Securing the Elderly: A Developmental Approach to Hypermedia-Based Online Information Security for Senior Novice Computer Users. Proceedings of the 2nd International Cyber Resilience Conference, 20 - 28, Perth, Western Australia.
  • Szewczyk, P., (2011), Usability of Internet Security Software: Have They Got it Right?. Proceedings of the 2011 5th International Conference on Network and System Security, 337-341, Piscataway, NJ.
  • Andersson, K., Szewczyk, P., (2011), Insecurity by obscurity continues: are ADSL router manuals putting end-users at risk. Proceedings of the 9th Australian Information Security Management Conference, 19-24, Perth, Western Australia.
Skip to top of page