Top of page
Global Site Navigation

School of Science

Local Section Navigation
You are here: Main Content

Associate Professor Paul Haskell-Dowland

Associate Dean

Staff Member Details
Telephone: +61 8 6304 5039
Email: p.haskelldowland@ecu.edu.au
Campus: Joondalup  
Room: JO18.312  
ORCID iD: https://orcid.org/0000-0003-1365-0929

Paul is an Associate Professor and Associate Dean (Computing and Security) in the School of Science.

Background

Associate Professor Paul Haskell-Dowland is the Associate Dean for Computing and Security in the School of Science at Edith Cowan University. Paul has delivered keynotes, invited presentations, workshops, professional development/training and seminars across the world for audiences including RSA Security, ITU and IEEE. He has appeared on local and national media (newspaper, radio and tv) commenting on current cyber issues as well as contributions through articles published in The Conversation. Paul has more than 20 years of experience in cyber security research and education in both the UK and Australia.

Paul is the Working Group Coordinator and the ACS/Australian Country Member Representative to the International Federation for Information Processing (IFIP) Technical Committee 11 (TC11 - Security and Privacy Protection in Information Processing Systems), the secretary to IFIP Working Group 11.1 (Information Security Management), and a member of the ACS Cyber Security Committee, a Fellow of the Higher Education Authority, a Senior Member of the IEEE, a Fellow of the BCS and a Senior Member of the ACS/Certified Professional. He is the author of over 90 papers in refereed international journals and conference proceedings and edited 29 proceedings.

Professional Memberships

  • MAISA (Member of the Australian Information Security Association, September 2019)
  • Working Group Coordinator, IFIP TC11, June 2017
  • Senior Member of the ACS - Certified Professional MACS (Snr) CP and IP3P, December 2016
  • SMIEEE (Senior Member of the IEEE), April 2016
  • Member of the Council of Professors and Heads of Computing (CPHC), September 2015
  • MIEEE (Member of the IEEE), August 2015
  • FBCS (Fellow of British Computer Society), September 2010
  • IFIP Silver Core recipient, 2010
  • Member of the IFIP TC 11 Working Group 11.12 on Human Aspects of Information Security and Assurance
  • Secretary & Webmaster, IFIP TC11 Working Group 11.1 on Information Security Management, August 2004
  • Branch Committee Member & Webmaster, BCS South West, April 2004-2016
  • MBCS (Member of British Computer Society), April 2004

Research Areas and Interests

  • Network and System Security
  • Teaching and Learning Technologies
  • Learner and Learning Analytics
  • Security Education
  • Child eSafety
  • Network Monitoring
  • Misuse Detection
  • Authentication Technologies

Qualifications

  • Doctor of Philosophy, United Kingdom, 2004.
  • Postgraduate Certificate in Learning and Teaching in Higher, United Kingdom, 2001.
  • Bachelor of Science with First Class Honours, England, 1998.

Research Outputs

Journal Articles

  • Kang, J., Haskell-Dowland, P., Yang, W., Zheng, X., Dibaei, M., Luo, G. (2021). An Energy-Efficient and Secure Data Inference Framework for Internet of Health Things: A Pilot Study. Sensors, 21(1), 17 pages. https://doi.org/https://doi.org/10.3390/s21010312.

Journal Articles

  • Rashid, B., Ahmed, M., Sikos, L., Haskell-Dowland, P. (2020). A Novel Penalty-Based Wrapper Objective Function for Feature Selection in Big Data using Cooperative Co-Evolution. IEEE Access, 8(2020), 150113-150129. https://doi.org/10.1109/ACCESS.2020.3016679.
  • Rashid, B., Ahmed, M., Sikos, L., Haskell-Dowland, P. (2020). Cooperative co-evolution for feature selection in Big Data with random feature grouping. Journal of Big Data, 7(1), Article number 107. https://doi.org/10.1186/s40537-020-00381-y.
  • Brooks, D., Coole, M., Haskell-Dowland, P. (2020). Intelligent Building Systems: Security and Facility Professionals’ Understanding of System Threats, Vulnerabilities and Mitigation Practice. Security Journal, 33(2), 244–265. https://doi.org/https://doi.org/10.1057/s41284-019-00183-9.
  • Kang, J., Yang, W., Dermody, D., Ghasemian, M., Adibi, S., Haskell-Dowland, P. (2020). No Soldiers Left Behind: An IoT-Based Low-Power Military Mobile Health System Design. IEEE Access, 8(2020), Article number 9247977. https://doi.org/10.1109/ACCESS.2020.3035812.

Conference Publications

  • Chady, T., Haskell-Dowland, P. (2020). The Hop Portal Snowglobe Architecture: Making Virtual Reality Functional. INTED2020 Proceedings (8395-8403). IATED Academy. https://doi.org/10.21125/inted.2020.2283.
  • Ellis, M., Thompson, G., Haskell-Dowland, P. (2020). Building a Better Micro:Bit IDE – Teaching Computer Science. INTED2020 Proceedings (8425-8433). IATED Academy. https://doi.org/10.21125/inted.2020.2290.
  • Furnell, S., Haskell-Dowland, P. (2020). Good guidance or mistaken misdirection: Assessing the quality of password advice. Annual Information Institute Conference Proceedings (1-9). Information Institute.
  • Karie, N., Bin Sahri, NM., Haskell-Dowland, P. (2020). IoT Threat Detection Advances, Challenges and Future Directions. Proceedings 2020 Workshop on Emerging Technologies for Security in IoT ETSecIoT 2020 (22-29). Institute of Electrical and Electronics Engineers, Inc.. https://doi.org/10.1109/ETSecIoT50046.2020.00009.

Journal Articles

  • Al-Bayati, B., Clarke, N., Haskell-Dowland, P., Li, F. (2019). Behavioral Profiling for Transparent Verification in Cloud Storage Services. Journal of Information Warfare, 17(4), 88-105.

Conference Publications

  • Vasileiou, I., Haskell-Dowland, P. (2019). Addressing STEM Geek Culture Through Peer Learning. EDULEARN19 Proceedings (5289-5293). IATED Academy. https://doi.org/10.21125/edulearn.2019.1298.
  • Kang, J., Fahd, K., Venkatraman, S., Trujillo-Rausa, R., Haskell-Dowland, P. (2019). Hybrid Routing for Man-in-the-Middle (MITM) Attack Detection in IoT Networks. 2019 29th International Telecommunication Networks and Applications Conference (ITNAC) (Article number 9077977). IEEE. https://doi.org/10.1109/ITNAC46935.2019.9077977.
  • Ellis, M., Thompson, G., Haskell-Dowland, P. (2019). From Model B To Micro:Bit – Teaching Computer Science. Proceedings of EDULEARN19 Conference (2725-2731). IATED Academy. https://doi.org/10.21125/edulearn.2019.0744.

Journal Articles

  • Chaudhry, J., Saleem, K., Haskell-Dowland, P., Miraz, M. (2018). A Survey of Distributed Certificate Authorities in MANETs. Annals of Emerging Technologies in Computing (AETiC), 2(3), 11-18.

Conference Publications

  • Al-Bayati, B., Clarke, N., Haskell-Dowland, P., Li, F. (2018). Misuse Detection in a Simulated IaaS Environment. Emerging Technologies for Authorization and Authentication. ETAA 2018. Lecture Notes in Computer Science (103-115). Springer. https://doi.org/10.1007/978-3-030-04372-8_9.
  • Mahmoud, N., Furnell, S., Haskell-Dowland, P. (2018). Design Principles and Guidelines for Targeted Security Awareness. Proceedings of the Annual Information Institute Conference (18p.). Information Institute.
  • Al-Bayati, B., Clarke, N., Haskell-Dowland, P., Li, F. (2018). Continuous identity verification in cloud storage services using behavioural profiling. ECCWS 2018 17th European Conference on Cyber Warfare and Security (10p.).

Journal Articles

  • Korovessis, P., Furnell, S., Papadaki, M., Haskell-Dowland, P. (2017). A toolkit approach to information security awareness and education. Journal of Cybersecurity Education, Research and Practice, 2017(2), article no.5.
  • Alharbi, N., Papadaki, M., Haskell-Dowland, P. (2017). The impact of security and its antecedents in behaviour intention of using e-government services. Behaviour and Information Technology, 36(6), 620-636. https://doi.org/10.1080/0144929X.2016.1269198.

Conference Publications

  • Enamamu, T., Clarke, N., Haskell-Dowland, P., Li, F. (2017). Smart Watch based Body-Temperature Authentication. Proceedings of the IEEE International Conference on Computing, Networking and Informatics (ICCNI 2017) (7p.). IEEE. https://doi.org/10.1109/ICCNI.2017.8123790.
  • Mahmoud, N., Furnell, S., Haskell-Dowland, P. (2017). Towards Targeted Security Awareness Raising. Proceedings of the Annual Information Institute Conference (13p.). Information Institute.
  • Al-Naffakh, NH., Clarke, N., Li, F., Haskell-Dowland, P. (2017). Unobtrusive Gait Recognition using Smartwatches. Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI) (211-218). IEEE. https://doi.org/10.23919/BIOSIG.2017.8053523.
  • Enamamu, T., Clarke, N., Haskell-Dowland, P., Li, F. (2017). Transparent Authentication: Utilising Heart Rate for User Authentication. International Conference for Internet Technology and Secured Transactions (ICITST-2017) Proceedings (283-289).

Journal Articles

  • Alsaiari, H., Papadaki, M., Haskell-Dowland, P., Furnell, S. (2016). Graphical One-Time Password (GOTPass): A usability evaluation. Information Security Journal: a Global Perspective, 25(1-3), 94-108. https://doi.org/10.1080/19393555.2016.1179374.
  • Zaaba, ZF., Furnell, S., Haskell-Dowland, P. (2016). Literature Studies on Security Warnings Development. International Journal on Perceptive and Cognitive Computing, 2(1), 8-18. https://doi.org/10.31436/ijpcc.v2i1.22.
  • Al-Bayati, B., Clarke, N., Haskell-Dowland, P. (2016). Adaptive Behavioral Profiling for Identity Verification in Cloud Computing: A Model and Preliminary Analysis. The GSTF Journal on Computing, 5(1), 21-28. https://doi.org/10.5176/2251-3043_4.4.348.
  • Al-Naffakh, N., Clarke, N., Haskell-Dowland, P., Li, F. (2016). A Comprehensive Evaluation of Feature Selection for Gait Recognition Using Smartwatches. International Journal for Information Security Research, 6(3), 691-700. https://doi.org/10.20533/ijisr.2042.4639.2016.0080.

Conference Publications

  • Alsaiari, H., Papadaki, M., Haskell-Dowland, P., Furnell, S. (2016). A review of graphical authentication utilising a keypad input method. Proceedings of the 8th Saudi Students Conference (359-374). World Scientific Publishing Co.. https://doi.org/10.1142/9781783269150_0031.
  • Ketab, S., Clarke, N., Haskell-Dowland, P. (2016). The Value of the Biometrics in Invigilated E-Assessments. EDULEARN16 Conference Proceedings (7648-7659). IATED Academy. https://doi.org/10.21125/edulearn.2016.0687.
  • Triantafyllidis, A., Clarke, N., Haskell-Dowland, P., Vranopoulos, G. (2016). Increasing eLearning Engagement Using Mobile Technologies. ICERI2016 Conference Proceedings (8644-8653). IATED Academy.
  • Ai-Naffakh, N., Clarke, N., Haskell-Dowland, P., Li, F. (2016). Activity Recognition using wearable computing. International Conference for Internet Technology and Secured Transactions, ICITST 2016 (189-195). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICITST.2016.7856695.

Journal Articles

  • Alsaiari, H., Papadaki, M., Haskell-Dowland, P., Furnell, S. (2015). Secure Graphical One Time Password (GOTPass): An Empirical Study. Information Security Journal: a Global Perspective, 24(4-6), 207-220. https://doi.org/10.1080/19393555.2015.1115927.

Conference Publications

  • Ketab, SS., Clarke, N., Haskell-Dowland, P. (2015). E-Invigilation of E-Assessments. Proceedings of the 9th International Technology, Education and Development Conference (1582-1591). IATED Academy.

Journal Articles

  • Li, F., Clarke, N., Papadaki, M., Haskell-Dowland, P. (2014). Active Authentication for Mobile Devices Utilising Behaviour Profiling. International Journal of Information Security, 13(3), 229-244. https://doi.org/10.1007/s10207-013-0209-6.
  • Jali, MZ., Furnell, S., Haskell-Dowland, P. (2014). Investigating the Viability of Multifactor Graphical Passwords for User Authentication. Information Security Journal, 23(1-2), 10-21. https://doi.org/10.1080/19393555.2014.891274.
  • Alharbi, N., Papadaki, M., Haskell-Dowland, P. (2014). Security Factors Influencing End Users' Adoption of E-Government. Journal of Internet Technology and Secured Transaction, 3(4), 320-328. https://doi.org/10.20533/jitst.2046.3723.2014.0040.

Conference Publications

  • Knirsch, A., Wietzke, J., Moore, R., Haskell-Dowland, P. (2014). Connected in-car multimedia: Qualities affecting composability of dynamic functionality. Proceedings of the Tenth International Network Conference (81-93). Plymouth University.
  • Alharbi, N., Papadaki, M., Haskell-Dowland, P. (2014). Security Challenges of E-Government Adoption Based On End Users’ Perspective. Internet Technolgy and Secured Transactions (ICITST), 2014 9th International Conference for (78-82). IEEE. https://doi.org/10.1109/ICITST.2014.7038781.
  • Dorigo, ML., Harriehausen-Mühlbauer, B., Stengel, I., Haskell-Dowland, P. (2014). Nonvisual presentation, navigation and manipulation of structured documents on mobile and wearable devices. Lecture Notes in Computer Science (383-390). Springer. https://doi.org/10.1007/978-3-319-08596-8_59.
  • Alsaiari, H., Papadaki, M., Haskell-Dowland, P., Furnell, SM. (2014). Alternative Graphical Authentication for Online Banking Environments. Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance (122-136). CSCAN.

Conference Publications

  • Dorigo, M., Harriehausen-Muhlbauer, B., Stengel, I., Haskell-Dowland, P. (2013). Nonvisual presentation and navigation within the structure of digital text-documents on mobile devices. Universal Access in Human-Computer Interaction: Design Methods, Tools, and Interaction Techniques for eInclusion (311-320). Springer. https://doi.org/10.1007/978-3-642-39194-1-37.
  • Triantafyllidis, A., Clarke, N., Haskell-Dowland, P. (2013). Learning management systems in higher education: a faculty perspective. Proceedings of the 6th International Conference of Education, Research and Innovation (5120-5130). IATED.
  • Clarke, N., Haskell-Dowland, P., Furnell, S. (2013). E-Invigilator: A biometric-based Supervision System for e-Assessments. 2013 International Conference on Information Society (i-Society) (238-242). IEEE.

Conference Publications

  • Triantafyllidis, A., Clarke, N., Haskell-Dowland, P. (2012). Learning management systems in higher education: A student perspective. Proceedings of the 5th International Conference of Education, Research and Innovation (4046-4055). IATED.

Journal Articles

  • Li, F., Clarke, N., Papadaki, M., Haskell-Dowland, P. (2011). Misuse Detection for Mobile Devices Using Behaviour Profiling. International Journal of Cyber Warfare and Terrorism, 1(1), 43-55. https://doi.org/10.4018/ijcwt.2011010105.
  • Jali, M., Furnell, S., Haskell-Dowland, P. (2011). Quantifying the effect of graphical password guidelines for better security. IFIP Advances in Information and Communication Technology, 354(2011), 80-91. https://doi.org/10.1007/978-3-642-21424-0_7.
  • Sanders, B., Haskell-Dowland, P., Atkinson, S., Furnell, S. (2011). Massively Multi-Player Online Role Playing Games: What’s the Risk?. Journal of Virtual Worlds Research, 3(3), 6p.. https://doi.org/10.4101/jvwr.v3i3.874.

Conference Publications

  • Zaaba, Z., Furnell, S., Haskell-Dowland, P. (2011). End-user perception and usability of information security. Proceedings of the fifth international symposium on human aspects of information security and assurance (97-107). University of Plymouth.
  • Dorigo, M., Harriehausen-Muhlbauer, B., Stengel, I., Haskell-Dowland, P. (2011). Survey: Improving Document Accessibility from the Blind and Visually Impaired User’s Point of View. Proceedings of the Universal Access in Human-Computer Interaction - held as part of HCI International 2011 (part IV) (129-135). Springer. https://doi.org/10.1007/978-3-642-21657-2_14.
  • Jali, MZ., Furnell, S., Haskell-Dowland, P. (2011). Multifactor graphical passwords: An assessment of end-user performance. Proceedings of the 2011 7th International Conference on Information Assurance and Security, IAS 2011 (Article no. 6122786). IEEE. https://doi.org/10.1109/ISIAS.2011.6122786.
  • Li, F., Clarke, N., Papadaki, M., Haskell-Dowland, P. (2011). Behaviour Profiling for Transparent Authentication for Mobile Devices. Proceedings of the 10th European Conference on Information Warfare and Security (307-314). Academic Publishing Limited.

Journal Articles

  • Jali, M., Furnell, S., Haskell-Dowland, P. (2010). Assessing image-based authentication techniques in a web-based environment.. Information Management & Computer Security, 18(1), 43-53.

Conference Publications

  • Li, F., Clarke, N., Papadaki, M., Haskell-Dowland, P. (2010). Behaviour profiling on mobile devices.. Emerging Security Technologies (EST), 2010 International Conference on (77-82). IEEE. https://doi.org/10.1109/EST.2010.26.

Conference Publications

  • Sanders, B., Haskell-Dowland, P., Furnell, S. (2009). An Assessment of People's Vulnerabilities in Relation to Personal and Sensitive Data. Proceedings of the Third International Symposium on Human Aspects of Information Security & Assurance (HAISA 2009) (50-60). University of Plymouth.
  • Jali, M., Furnell, S., Haskell-Dowland, P. (2009). Evaluating Web-Based User Authentication using Graphical Techniques. Proceedings of the Third International Symposium on Human Aspects of Information Security & Assurance (HAISA 2009) (108-118). University of Plymouth.

Research Projects

  • Semantic modelling of Digital Twins for Cyber Security Defence Automation, Commonwealth Scientific and Industrial Research Organisation (CSIRO), CSIRO - Scholarship, 2021 ‑ 2024, $150,000.
  • In-Circuit Forensic Analysis of IoT Memory Modules, Cyber Security Research Centre Ltd, Cyber Security Research Centre PhD Scholarship, 2020 ‑ 2023, $180,000.
  • Data – Increased cybersecurity risk from working at home, Department of Jobs, Tourism, Science and Innovation, Covid-19 Research Fund, 2020 ‑ 2022, $100,000.
  • Heterogeneous Anomaly Detection from Network Traffic Streams using Data Summarization, Cyber Security Research Centre Ltd, Cyber Security Research Centre Masters Scholarship, 2020 ‑ 2022, $120,000.
  • Academic Centre of Cyber Security Excellence, Department of Education, Skills and Employment, Academic Centres of Cyber Security Excellence, 2017 ‑ 2021, $950,287.
  • Intelligent Building Security: An investigation into Vulnerabilities, Current Practice and Security Management Best Practice, ASIS International, ASIS - Grant, 2017 ‑ 2018, $79,339.

Research Student Supervision

Associate Supervisor

  • Doctor of Philosophy, Cooperative co-evolution-based feature selection for big data analytics
  • Doctor of Philosophy, In-circuit foresnic analysis of IoT memory modules
  • Doctor of Philosophy, Developing resilient approaches for detection of compromised IoT devices through machine learning

Principal Supervisor

  • Doctor of Philosophy: Improved Composability of Software Components Through Parallel Hardware Platforms for In-Car Multimedia Systems
  • Doctor of Philosophy: Increasing eLearning Engagement Through Mobile Learning Integration
  • Doctor of Philosophy: Behaviour Profiling for Mobile Devices
  • Doctor of Philosophy: Active Security Vulnerability Notification and Resolution
  • Doctor of Philosophy: Graphical One-Time-Password Authentication
  • Master by Research: Data Mining Applied to External Marketing Data
  • Doctor of Philosophy: E-Invigilator of E-Assessment
  • Doctor of Philosophy: Opportunities and Risks in Online Gaming Environments
  • Master of Science (Computer Science), The challenges of digital legacy management on the value of digital objects to older Australians
  • Doctor of Philosophy: The Role of Security and Its Antecedents in e-Government Adoption
  • Doctor of Philosophy: Enhancing User Authentication Using Graphical Techniques
  • Doctor of Philosophy: Enhancing Usability Using Automated Security Interface Adaption (ASIA)
  • Doctor of Philosophy: Establishing an Information Security Awareness and Culture
  • Doctor of Philosophy: High Performance Near-Time Processing of Bulk Data

Associate Supervisor

  • DOKY: A Multi-Modal User Interface for Non-Visual Presentation, Navigation and Manipulation of Structured Documents on Mobile and Wearable Devices
  • Doctor of Philosophy: Activity-Based User Authentication Using Smartwatches
  • Continuous Identity Verification in Cloud Computing Services
  • Bioelectrical User Authentication
  • An Evaluation of Targeted Security Awareness for End Users
  • Master of Science (Computer Science), An Investigation into the Efficacy of URL Content Filtering Systems
Skip to top of page