Top of page
Global Site Navigation

School of Computer and Security Science

Local Section Navigation
You are here: Main Content

Mr Patryk Szewczyk

Lecturer

Contact Information Telephone: (61 8) 9370 6979, Email: p.szewczyk@ecu.edu.au, Campus: Mount Lawley, Room: ML13.237
Staff Member Details
Telephone: (61 8)  9370 6979  
Email: p.szewczyk@ecu.edu.au   
Campus: Mount Lawley  
Room: ML13.237  

 

Patryk is a Lecturer in the School of Computer and Security Science and a member of the ECU Security Research Institute.

Current Teaching

  • Computer Security
  • Computer Forensics
  • IT Security Management

Professional Associations

  • Australian Computer Society
  • Australian Information Security Association
  • Australian and New Zealand Forensic Science Society

Awards and Recognition

National and International Awards

  • 2011 WAITTA Winner - Service Delivery & Training
  • 2010 WAITTA Finalist - Security

Other

  • 2009 Best Paper Award - Australian Digital Forensics Conference

Research Areas and Interests

  • ADSL router forensics, embedded system forensic, consumer electronic forensics
  • End-user security awareness, security education, security perceptions, usability of security products

Staff Qualifications

  • BScHons (Bachelor of Science Honours), Edith Cowan University, 2006 .
  • BSc (Bachelor of Science), Edith Cowan University, 2005 .

Recent Publications (within the last five years)

Journal Articles

  • Szewczyk, P., (2012), An Australian Perspective on the Challenges for Computer and Network Security for Novice End-Users. Journal of Digital Forensics, Security and Law, 7(4), 51-72, Metropolitan State University, Minnesota, USA.
  • Szewczyk, P., (2011), Analysis of Data Remaining on Second Hand ADSL Routers. Journal of Digital Forensics, Security and Law, 6(3), 17-30, Virginia.
  • Szewczyk, P., (2010), The ADSL Router Forensics Process. Journal of Network Forensics, 2(1), 4-13, Perth, Western Australia.

Conference Publications

  • El-Abed, J., Szewczyk, P., (2014), Persistent issues in encryption software: A heuristic and cognitive walkthrough. Proceedings of the 12th Australian Information Security Management Conference, 64-74, Perth, W.A..
  • Szewczyk, P., (2013), Usability and security support offered through ADSL router user manuals. The Proceedings of 11th Australian Information Security Management Conference, 93-101, Joondalup, WA.
  • Szewczyk, P., Robins, N., Sansurooah, K., (2013), Sellers continue to give away confidential information on second hand memory cards sold in Australia. The Proceedings of 11th Australian Digital Forensics Conference, 135-140, Joondalup, WA.
  • Sansurooah, K., Szewczyk, P., (2012), A study of remnant data found on USB storage devices offered for sale on the Australian second hand market in 2011. Proceedings of the 10th Australian Information Security Management Conference, 83-91, Perth, Western Australia.
  • Szewczyk, P., (2012), A Survey of Computer and Network Security Support from Computer Retailers to Consumers in Australia. The Proceedings of the 10th Australian Information Security Management Conference, 111-117, Edith Cowan University Perth, Western Australia.
  • Szewczyk, P., Sansurooah, K., (2012), The 2012 Investigation into Remnant Data on Second Hand Memory Cards Sold in Australia. The Proceedings of the 10th Australian Digital Forensics Conference, 41-46, Edith Cowan University, Perth, Western Australia.
  • Szewczyk, P., Sansurooah, K., (2011), A 2011 investigation into remnant data on second hand memory cards sold in Australia. Proceedings of the 9th Australian Digital Forensics Conference, 134-138, Perth, Western Australia.
  • Andersson, K., Szewczyk, P., (2011), Insecurity by obscurity continues: are ADSL router manuals putting end-users at risk. Proceedings of the 9th Australian Information Security Management Conference, 19-24, Perth, Western Australia.
  • Cook, D., Szewczyk, P., Sansurooah, K., (2011), Securing the Elderly: A Developmental Approach to Hypermedia-Based Online Information Security for Senior Novice Computer Users. Proceedings of the 2nd International Cyber Resilience Conference, 20 - 28, Perth, Western Australia.
  • Barker, J., Hannay, P., Szewczyk, P., (2011), Using traffic analysis to identify The Second Generation Onion Router. Proceedings: 2011 Ninth IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, 72-78, Piscataway, NJ.
  • Szewczyk, P., (2011), Usability of Internet Security Software: Have They Got it Right?. Proceedings of the 2011 5th International Conference on Network and System Security, 337-341, Piscataway, NJ.
  • Cook, D., Szewczyk, P., Sansurooah, K., (2011), Seniors Language Paradigms: 21st Century Jargon and the Impact on Computer Security and Financial Transactions for Senior Citizens. Proceedings of the 9th Australian Information Security Management Conference, 63-68, Perth, Western Australia .
  • Szewczyk, P., (2010), Security Information Supplied by Australian Internet Service Providers. Proceedings of the 8th Australian Information Security Management Conference, 143-148, Perth, Western Australia.
  • Szewczyk, P., Valli, C., (2010), Ignorant experts: computer and network security support from internet service providers. Proceedings 2010 4th International Conference on Network and System Security (NSS), 323-327, Piscataway, N.J., DOI: 10.1109/NSS.2010.42.
Skip to top of page