Contact Information Telephone: (61 8) 6304 5788, Email: email@example.com, Campus: Joondalup, Room: JO18.246
David is a Senior Lecturer in Security Science in the School of Computer and Security Science and a member of the ECU Security Research Institute.
- SCY1101/SCY4101 - Security and Risk Management
- SCY4108 - Building Management Systems
- SCY4411/SCY5203 - Advanced Security Risk Management
Prior to taking up the Security Science position with Edith Cowan University, David was employed by the Australian Defence Department as the Western Australian Regional Contract Manager for fixed plant and equipment. He was primarily responsible for the development, implementation and maintenance of the strategic process of facility plant maintenance and management. In addition, his other responsibilities included facility management and contract administration of all plant and equipment operations and maintenance activities within the West Australian region.
Previous employment included seven years within the commercial security environment as a technical consultant and 13 years in the Royal Air Force (UK) as a Development Engineer in Defence Radar and Display systems.
- ASIS International, WA Chapter Treasurer
Awards and Recognition
University and National Teaching Awards
- School of Engineering Distinguished Service Award for Service (2004)
Research Areas and Interests
- Entropic security decay: Developing an understanding on how to define and measure characteristics that reduce the commissioning effectiveness of security as a mitigation system.
- Security Science body of knowledge: Understanding, defining and developing Organisational security.
- Resilience within Security: Both within an organisation and as a vetting tool.
- Security risk management: Use of psychometric multidimensional scaling to present knowledge structure and better understand social risk.
- Psychometric concept mapping of expert knowledge structure, such as security risk managers and security body of knowledge. Mapping concepts and social risks, such as terrorism.
- Defeat evaluation of security technology.
- Building management systems (BMS) vulnerabilities.