Top of page
Main Content

Mr Patryk Szewczyk

Lecturer

Contact Information Telephone: (61 8) 9370 6979, Email: p.szewczyk@ecu.edu.au, Campus: Mount Lawley, Room: ML13.237
Staff Member Details
Telephone: (61 8)  9370 6979  
Email: p.szewczyk@ecu.edu.au   
Campus: Mount Lawley  
Room: ML13.237  

 

Patryk is a Lecturer in the School of Computer and Security Science and a member of the ECU Security Research Institute.

Current Teaching

  • Computer Security
  • Computer Forensics
  • IT Security Management

Professional Associations

  • Australian Computer Society
  • Australian Information Security Association
  • Australian and New Zealand Forensic Science Society

Awards and Recognition

National and International Awards

  • 2011 WAITTA Winner - Service Delivery & Training
  • 2010 WAITTA Finalist - Security

Other

  • 2009 Best Paper Award - Australian Digital Forensics Conference

Research Areas and Interests

  • ADSL router forensics, embedded system forensic, consumer electronic forensics
  • End-user security awareness, security education, security perceptions, usability of security products

Staff Qualifications

  • BScHons (Bachelor of Science Honours), Edith Cowan University, 2006 .
  • BSc (Bachelor of Science), Edith Cowan University, 2005 .

Recent Publications (within the last five years)

Journal Articles

  • Szewczyk, P., (2012), An Australian Perspective on the Challenges for Computer and Network Security for Novice End-Users. Journal of Digital Forensics, Security and Law, 7(4), 51-72, Metropolitan State University, Minnesota, USA.
  • Szewczyk, P., (2011), Analysis of Data Remaining on Second Hand ADSL Routers. Journal of Digital Forensics, Security and Law, 6(3), 17-30, Virginia.
  • Szewczyk, P., (2010), The ADSL Router Forensics Process. Journal of Network Forensics, 2(1), 4-13, Perth, Western Australia.
  • Szewczyk, P., Valli, C., (2009), Insecurity by Obscurity: A Review of SoHo Router Literature from a Network Security Perspective. Journal of Digital Forensics, Security and Law, 4(3), 5-16, Farmville, Virginia .
  • Szewczyk, P., (2009), ADSL Router Forensics: Methods of Acquisition. Journal of Network Forensics, 1(1), 16-29, Perth, Australia.

Conference Publications

  • Szewczyk, P., Robins, N., Sansurooah, K., (2013), Sellers continue to give away confidential information on second hand memory cards sold in Australia. The Proceedings of 11th Australian Digital Forensics Conference, 135-140, Joondalup, WA.
  • Szewczyk, P., (2013), Usability and security support offered through ADSL router user manuals. The Proceedings of 11th Australian Information Security Management Conference, 93-101, Joondalup, WA.
  • Sansurooah, K., Szewczyk, P., (2012), A study of remnant data found on USB storage devices offered for sale on the Australian second hand market in 2011. Proceedings of the 10th Australian Information Security Management Conference, 83-91, Perth, Western Australia.
  • Szewczyk, P., Sansurooah, K., (2012), The 2012 Investigation into Remnant Data on Second Hand Memory Cards Sold in Australia. The Proceedings of the 10th Australian Digital Forensics Conference, 41-46, Edith Cowan University, Perth, Western Australia.
  • Szewczyk, P., (2012), A Survey of Computer and Network Security Support from Computer Retailers to Consumers in Australia. The Proceedings of the 10th Australian Information Security Management Conference, 111-117, Edith Cowan University Perth, Western Australia.
  • Szewczyk, P., (2011), Usability of Internet Security Software: Have They Got it Right?. Proceedings of the 2011 5th International Conference on Network and System Security, 337-341, Piscataway, NJ.
  • Cook, D., Szewczyk, P., Sansurooah, K., (2011), Seniors Language Paradigms: 21st Century Jargon and the Impact on Computer Security and Financial Transactions for Senior Citizens. Proceedings of the 9th Australian Information Security Management Conference, 63-68, Perth, Western Australia .
  • Cook, D., Szewczyk, P., Sansurooah, K., (2011), Securing the Elderly: A Developmental Approach to Hypermedia-Based Online Information Security for Senior Novice Computer Users. Proceedings of the 2nd International Cyber Resilience Conference, 20 - 28, Perth, Western Australia.
  • Barker, J., Hannay, P., Szewczyk, P., (2011), Using traffic analysis to identify The Second Generation Onion Router. Proceedings: 2011 Ninth IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, 72-78, Piscataway, NJ.
  • Andersson, K., Szewczyk, P., (2011), Insecurity by obscurity continues: are ADSL router manuals putting end-users at risk. Proceedings of the 9th Australian Information Security Management Conference, 19-24, Perth, Western Australia.
  • Szewczyk, P., Sansurooah, K., (2011), A 2011 investigation into remnant data on second hand memory cards sold in Australia. Proceedings of the 9th Australian Digital Forensics Conference, 134-138, Perth, Western Australia.
  • Szewczyk, P., (2010), Security Information Supplied by Australian Internet Service Providers. Proceedings of the 8th Australian Information Security Management Conference, 143-148, Perth, Western Australia.
  • Szewczyk, P., Valli, C., (2010), Ignorant experts: computer and network security support from internet service providers. Proceedings 2010 4th International Conference on Network and System Security (NSS), 323-327, Piscataway, N.J., DOI: 10.1109/NSS.2010.42.
  • Pydayya, K., Hannay, P., Szewczyk, P., (2009), The 2009 Personal Firewall Robustness Evaluation. Proceedings of the 7th Australian Information Security Management Conference, 98-102, Perth, Western Australia.
  • Szewczyk, P., (2009), ADSL Router Forensics Part 2: Acquiring Evidence. Proceedings of the 7th Australian Digital Forensics Conference, 109-117, Perth, WA.
  • Szewczyk, P., Furnell, S., (2009), Assessing the Online Security Awareness of Australian Internet Users. Proceedings of the Annual Security Conference, 58-1to58-9, Virginia Commonwealth University, USA.
Skip to top of page