Top of page
Global Site Navigation

School of Computer and Security Science

Local Section Navigation
You are here:
ECU is currently converting this web content to a more mobile friendly format. If you find the content below is not formatting correctly during this transition please view on desktop browser.
Main Content

Mr Patryk Szewczyk

Lecturer

Contact Information Telephone: (61 8) 9370 6979, Email: p.szewczyk@ecu.edu.au, Campus: Mount Lawley, Room: ML13.237
Staff Member Details
Telephone: (61 8)  9370 6979  
Email: p.szewczyk@ecu.edu.au   
Campus: Mount Lawley  
Room: ML13.237  

 

Patryk is a Lecturer in the School of Computer and Security Science and a member of the ECU Security Research Institute.

Current Teaching

  • Computer Security
  • Computer Forensics
  • IT Security Management

Professional Associations

  • Australian Computer Society
  • Australian Information Security Association
  • Australian and New Zealand Forensic Science Society

Awards and Recognition

National and International Awards

  • 2011 WAITTA Winner - Service Delivery & Training
  • 2010 WAITTA Finalist - Security

Other

  • 2009 Best Paper Award - Australian Digital Forensics Conference

Research Areas and Interests

  • ADSL router forensics, embedded system forensic, consumer electronic forensics
  • End-user security awareness, security education, security perceptions, usability of security products

Staff Qualifications

  • BScHons (Bachelor of Science Honours), Edith Cowan University, 2006 .
  • BSc (Bachelor of Science), Edith Cowan University, 2005 .

Recent Publications (within the last five years)

Journal Articles

  • Szewczyk, P., (2012), An Australian Perspective on the Challenges for Computer and Network Security for Novice End-Users. Journal of Digital Forensics, Security and Law, 7(4), 51-72, Metropolitan State University, Minnesota, USA.
  • Szewczyk, P., (2011), Analysis of Data Remaining on Second Hand ADSL Routers. Journal of Digital Forensics, Security and Law, 6(3), 17-30, Virginia.
  • Szewczyk, P., (2010), The ADSL Router Forensics Process. Journal of Network Forensics, 2(1), 4-13, Perth, Western Australia.
  • Szewczyk, P., Valli, C., (2009), Insecurity by Obscurity: A Review of SoHo Router Literature from a Network Security Perspective. Journal of Digital Forensics, Security and Law, 4(3), 5-16, Farmville, Virginia .
  • Szewczyk, P., (2009), ADSL Router Forensics: Methods of Acquisition. Journal of Network Forensics, 1(1), 16-29, Perth, Australia.

Conference Publications

  • Szewczyk, P., El-Abed, J., (2014), PERSISTENT ISSUES IN ENCRYPTION SOFTWARE: A HEURISTIC AND COGNITIVE WALKTHROUGH. Proceedings of the 12th Australian Information Security Management Conference, 64-74, Edith Cowan University, Australia.
  • Szewczyk, P., (2013), Usability and security support offered through ADSL router user manuals. The Proceedings of 11th Australian Information Security Management Conference, 93-101, Joondalup, WA.
  • Szewczyk, P., Robins, N., Sansurooah, K., (2013), Sellers continue to give away confidential information on second hand memory cards sold in Australia. The Proceedings of 11th Australian Digital Forensics Conference, 135-140, Joondalup, WA.
  • Szewczyk, P., (2012), A Survey of Computer and Network Security Support from Computer Retailers to Consumers in Australia. The Proceedings of the 10th Australian Information Security Management Conference, 111-117, Edith Cowan University Perth, Western Australia.
  • Sansurooah, K., Szewczyk, P., (2012), A study of remnant data found on USB storage devices offered for sale on the Australian second hand market in 2011. Proceedings of the 10th Australian Information Security Management Conference, 83-91, Perth, Western Australia.
  • Szewczyk, P., Sansurooah, K., (2012), The 2012 Investigation into Remnant Data on Second Hand Memory Cards Sold in Australia. The Proceedings of the 10th Australian Digital Forensics Conference, 41-46, Edith Cowan University, Perth, Western Australia.
  • Barker, J., Hannay, P., Szewczyk, P., (2011), Using traffic analysis to identify The Second Generation Onion Router. Proceedings: 2011 Ninth IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, 72-78, Piscataway, NJ.
  • Andersson, K., Szewczyk, P., (2011), Insecurity by obscurity continues: are ADSL router manuals putting end-users at risk. Proceedings of the 9th Australian Information Security Management Conference, 19-24, Perth, Western Australia.
  • Szewczyk, P., (2011), Usability of Internet Security Software: Have They Got it Right?. Proceedings of the 2011 5th International Conference on Network and System Security, 337-341, Piscataway, NJ.
  • Cook, D., Szewczyk, P., Sansurooah, K., (2011), Seniors Language Paradigms: 21st Century Jargon and the Impact on Computer Security and Financial Transactions for Senior Citizens. Proceedings of the 9th Australian Information Security Management Conference, 63-68, Perth, Western Australia .
  • Cook, D., Szewczyk, P., Sansurooah, K., (2011), Securing the Elderly: A Developmental Approach to Hypermedia-Based Online Information Security for Senior Novice Computer Users. Proceedings of the 2nd International Cyber Resilience Conference, 20 - 28, Perth, Western Australia.
  • Szewczyk, P., Sansurooah, K., (2011), A 2011 investigation into remnant data on second hand memory cards sold in Australia. Proceedings of the 9th Australian Digital Forensics Conference, 134-138, Perth, Western Australia.
  • Szewczyk, P., (2010), Security Information Supplied by Australian Internet Service Providers. Proceedings of the 8th Australian Information Security Management Conference, 143-148, Perth, Western Australia.
  • Szewczyk, P., Valli, C., (2010), Ignorant experts: computer and network security support from internet service providers. Proceedings 2010 4th International Conference on Network and System Security (NSS), 323-327, Piscataway, N.J., DOI: 10.1109/NSS.2010.42.
  • Szewczyk, P., Furnell, S., (2009), Assessing the Online Security Awareness of Australian Internet Users. Proceedings of the Annual Security Conference, 58-1to58-9, Virginia Commonwealth University, USA.
  • Szewczyk, P., (2009), ADSL Router Forensics Part 2: Acquiring Evidence. Proceedings of the 7th Australian Digital Forensics Conference, 109-117, Perth, WA.
  • Pydayya, K., Hannay, P., Szewczyk, P., (2009), The 2009 Personal Firewall Robustness Evaluation. Proceedings of the 7th Australian Information Security Management Conference, 98-102, Perth, Western Australia.
Skip to top of page