Top of page
Global Site Navigation

School of Science

Local Section Navigation
You are here: Main Content

Associate Professor Paul Haskell-Dowland

Associate Dean

Contact Information Telephone: +61 8 6304 5039, Email:, Campus: Joondalup, Room: JO18.312
Staff Member Details
Telephone: +61 8 6304 5039
Campus: Joondalup  
Room: JO18.312  


Paul is an Associate Professor and Associate Dean (Computing and Security) in the School of Science.


Associate Professor Paul Haskell-Dowland is the Associate Dean for Computing and Security in the School of Science at Edith Cowan University and is an associate member of the Centre for Security, Communications & Network Research at Plymouth University (UK).  Paul has delivered keynotes, invited presentations, workshops, professional development/training and seminars across the world for audiences including RSA Security, Sri Lanka CERT, ITU and IEEE. He has appeared on local and national media (newspaper, radio and tv) commenting on current cyber issues as well as contributions through articles published in The Conversation. Paul has more than 20 years of experience in cyber security research and education in both the UK and Australia.

Paul is the Working Group Coordinator and the ACS/Australian Country Member Representative to the International Federation for Information Processing (IFIP) Technical Committee 11 (TC11 - Security and Privacy Protection in Information Processing Systems), the secretary to IFIP Working Group 11.1 (Information Security Management), and a member of the ACS Cyber Security Committee, a Fellow of the Higher Education Authority, a Senior Member of the IEEE, an Honorary Fellow of the Sir Alister Hardy Foundation for Ocean Science, a Fellow of the BCS and a Senior Member of the ACS/Certified Professional. He is the author of over 80 papers in refereed international journals and conference proceedings and edited 29 proceedings.

Together with colleagues at Plymouth University (Dr Bogdan Ghita and Prof. Steven Furnell), Paul co-invented the ICAlert platform. ICAlert is a managed device that monitors Internet access (initially aimed at primary and secondary schools), targeting users attempting to access illegal content (child abuse images) as well as terrorist content.  In February 2017, following several years of trials, a commercial product was launched in collaboration with the SouthWest Grid for Learning and the Internet Watch Foundation.

Professional Memberships

  • Working Group Coordinator, IFIP TC11, June 2017
  • Senior Member of the ACS - Certified Professional MACS (Snr) CP and IP3P, December 2016
  • SMIEEE (Senior Member of the IEEE), April 2016
  • Member of the Council of Professors and Heads of Computing (CPHC), September 2015
  • MIEEE (Member of the IEEE), August 2015
  • FBCS (Fellow of British Computer Society), September 2010
  • IFIP Silver Core recipient, 2010
  • Member of the IFIP TC 11 Working Group 11.12 on Human Aspects of Information Security and Assurance
  • Secretary & Webmaster, IFIP TC11 Working Group 11.1 on Information Security Management, August 2004
  • Branch Committee Member & Webmaster, BCS South West, April 2004-2016
  • MBCS (Member of British Computer Society), April 2004

Research Areas and Interests

  • Network and System Security
  • Teaching and Learning Technologies
  • Learner and Learning Analytics
  • Security Education
  • Child eSafety
  • Network Monitoring
  • Misuse Detection
  • Authentication Technologies


  • Doctor of Philosophy, United Kingdom, 2004.
  • Postgraduate Certificate in Learning and Teaching in Higher, United Kingdom, 2001.
  • Bachelor of Science with First Class Honours, England, 1998.


Recent Research Grants

  • In-Circuit Forensic Analysis of IoT Memory Modules,  Cyber Security Research Centre Ltd,  Cyber Security Research Centre PhD Scholarship,  2020 - 2023,  $180,000.
  • Data – Increased cybersecurity risk from working at home,  Department of Jobs, Tourism, Science and Innovation,  Covid-19 Research Fund,  2020 - 2022,  $135,554.
  • Heterogeneous Anomaly Detection from Network Traffic Streams using Data Summarization,  Cyber Security Research Centre Ltd,  Cyber Security Research Centre Masters Scholarship,  2020 - 2022,  $120,000.
  • Academic Centre of Cyber Security Excellence,  Department of Education, Skills and Employment,  Academic Centres of Cyber Security Excellence,  2017 - 2021,  $950,287.
  • Intelligent Building Security: An investigation into Vulnerabilities, Current Practice and Security Management Best Practice,  ASIS International,  ASIS - Grant,  2017 - 2018,  $79,339.

Recent Publications (within the last five years)

Journal Articles

  • Rashid, B., Ahmed, M., Sikos, L., Haskell-Dowland, P., (2020), A Novel Penalty-Based Wrapper Objective Function for Feature Selection in Big Data using Cooperative Co-Evolution. IEEE Access, 8(2020), 150113 - 150129, DOI: 10.1109/ACCESS.2020.3016679.
  • Brooks, D., Coole, M., Haskell-Dowland, P., (2020), Intelligent Building Systems: Security and Facility Professionals’ Understanding of System Threats, Vulnerabilities and Mitigation Practice. Security Journal, 33(2), 244–265, United Kingdom, Palgrave Macmillan Ltd., DOI:
  • Al-Bayati, B., Clarke, N., Haskell-Dowland, P., Li, F., (2019), Behavioral Profiling for Transparent Verification in Cloud Storage Services. Journal of Information Warfare, 17(4), 88-105, Virginia, United States of America, School of Computer and Information Science.
  • Chaudhry, J., Saleem, K., Haskell-Dowland, P., Miraz, M., (2018), A Survey of Distributed Certificate Authorities in MANETs. Annals of Emerging Technologies in Computing (AETiC), 2(3), 11-18, International Association of Educators and Researchers (IAER).
  • Korovessis, P., Furnell, S., Papadaki, M., Haskell-Dowland, P., (2017), A toolkit approach to information security awareness and education. Journal of Cybersecurity Education, Research and Practice, 2017(2), article no.5, Kennesaw State University.
  • Alharbi, N., Papadaki, M., Haskell-Dowland, P., (2017), The impact of security and its antecedents in behaviour intention of using e-government services. Behaviour and Information Technology, 36(6), 620-636, Taylor & Francis, DOI: 10.1080/0144929X.2016.1269198.
  • Alsaiari, H., Papadaki, M., Haskell-Dowland, P., Furnell, S., (2016), Graphical One-Time Password (GOTPass): A usability evaluation. Information Security Journal: a Global Perspective, 25(1-3), 94-108, United States, Taylor and Francis Inc., DOI: 10.1080/19393555.2016.1179374.
  • Al-Naffakh, N., Clarke, N., Haskell-Dowland, P., Li, F., (2016), A Comprehensive Evaluation of Feature Selection for Gait Recognition Using Smartwatches. International Journal for Information Security Research, 6(3), 691-700, Infonomics Society, DOI: 10.20533/ijisr.2042.4639.2016.0080.
  • Al-Bayati, B., Clarke, N., Haskell-Dowland, P., (2016), Adaptive Behavioral Profiling for Identity Verification in Cloud Computing: A Model and Preliminary Analysis. The GSTF Journal on Computing, 5(1), 21-28, Singapore, Global Science and Technology Forum, DOI: 10.5176/2251-3043_4.4.348.
  • Zaaba, ZF., Furnell, S., Haskell-Dowland, P., (2016), Literature Studies on Security Warnings Development. International Journal on Perceptive and Cognitive Computing, 2(1), 8-18, Malaysia, International Islamic University Malaysia, DOI: 10.31436/ijpcc.v2i1.22.
  • Alsaiari, H., Papadaki, M., Haskell-Dowland, P., Furnell, S., (2015), Secure Graphical One Time Password (GOTPass): An Empirical Study. Information Security Journal: a Global Perspective, 24(4-6), 207-220, United States, Taylor & Francis Inc., DOI: 10.1080/19393555.2015.1115927.

Conference Publications

  • Karie, N., Bin Sahri, NM., Haskell-Dowland, P., (2020), IoT Threat Detection Advances, Challenges and Future Directions. Proceedings 2020 Workshop on Emerging Technologies for Security in IoT ETSecIoT 2020 , 22-29, online, Institute of Electrical and Electronics Engineers, Inc., DOI: 10.1109/ETSecIoT50046.2020.00009.
  • Chady, T., Haskell-Dowland, P., (2020), The Hop Portal Snowglobe Architecture: Making Virtual Reality Functional. INTED2020 Proceedings, 8395-8403, Valencia, Spain, IATED Academy, DOI: 10.21125/inted.2020.2283.
  • Furnell, S., Haskell-Dowland, P., (2020), Good guidance or mistaken misdirection: Assessing the quality of password advice. Annual Information Institute Conference Proceedings, 1-9, online, Information Institute.
  • Ellis, M., Thompson, G., Haskell-Dowland, P., (2020), Building a Better Micro:Bit IDE – Teaching Computer Science. INTED2020 Proceedings, 8425-8433, Valencia, Spain, IATED Academy, DOI: 10.21125/inted.2020.2290.
  • Ellis, M., Thompson, G., Haskell-Dowland, P., (2019), From Model B To Micro:Bit – Teaching Computer Science. Proceedings of EDULEARN19 Conference, 2725-2731, online, IATED Academy, DOI: 10.21125/edulearn.2019.0744.
  • Kang, J., Fahd, K., Venkatraman, S., Trujillo-Rausa, R., Haskell-Dowland, P., (2019), Hybrid Routing for Man-in-the-Middle (MITM) Attack Detection in IoT Networks. 2019 29th International Telecommunication Networks and Applications Conference (ITNAC), Article number 9077977, online, IEEE, DOI: 10.1109/ITNAC46935.2019.9077977.
  • Vasileiou, I., Haskell-Dowland, P., (2019), Addressing STEM Geek Culture Through Peer Learning. EDULEARN19 Proceedings, 5289-5293, online, IATED Academy, DOI: 10.21125/edulearn.2019.1298.
  • Al-Bayati, B., Clarke, N., Haskell-Dowland, P., Li, F., (2018), Continuous identity verification in cloud storage services using behavioural profiling. ECCWS 2018 17th European Conference on Cyber Warfare and Security, 10p..
  • Al-Bayati, B., Clarke, N., Haskell-Dowland, P., Li, F., (2018), Misuse Detection in a Simulated IaaS Environment. Emerging Technologies for Authorization and Authentication. ETAA 2018. Lecture Notes in Computer Science, 11263(7 Sept 2018), 103-115, Switzerland, Springer, DOI: 10.1007/978-3-030-04372-8_9.
  • Mahmoud, N., Furnell, S., Haskell-Dowland, P., (2018), Design Principles and Guidelines for Targeted Security Awareness. Proceedings of the Annual Information Institute Conference, 18p., online, Information Institute.
  • Mahmoud, N., Furnell, S., Haskell-Dowland, P., (2017), Towards Targeted Security Awareness Raising. Proceedings of the Annual Information Institute Conference, 13p., Information Institute.
  • Enamamu, T., Clarke, N., Haskell-Dowland, P., Li, F., (2017), Transparent Authentication: Utilising Heart Rate for User Authentication. International Conference for Internet Technology and Secured Transactions (ICITST-2017) Proceedings, 283-289.
  • Enamamu, T., Clarke, N., Haskell-Dowland, P., Li, F., (2017), Smart Watch based Body-Temperature Authentication. Proceedings of the IEEE International Conference on Computing, Networking and Informatics (ICCNI 2017), 7p., IEEE, DOI: 10.1109/ICCNI.2017.8123790.
  • Al-Naffakh, NH., Clarke, N., Li, F., Haskell-Dowland, P., (2017), Unobtrusive Gait Recognition using Smartwatches. Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI), LNI P-270(20-22 Sept 2017), 211-218, IEEE, DOI: 10.23919/BIOSIG.2017.8053523.
  • Ai-Naffakh, N., Clarke, N., Haskell-Dowland, P., Li, F., (2016), Activity Recognition using wearable computing. International Conference for Internet Technology and Secured Transactions, ICITST 2016, 189-195, Piscataway, USA, Institute of Electrical and Electronics Engineers Inc., DOI: 10.1109/ICITST.2016.7856695.
  • Ketab, S., Clarke, N., Haskell-Dowland, P., (2016), The Value of the Biometrics in Invigilated E-Assessments. EDULEARN16 Conference Proceedings, 7648-7659, online only, IATED Academy, DOI: 10.21125/edulearn.2016.0687.
  • Triantafyllidis, A., Clarke, N., Haskell-Dowland, P., Vranopoulos, G., (2016), Increasing eLearning Engagement Using Mobile Technologies. ICERI2016 Conference Proceedings, 8644-8653, online only, IATED Academy.
  • Alsaiari, H., Papadaki, M., Haskell-Dowland, P., Furnell, S., (2016), A review of graphical authentication utilising a keypad input method. Proceedings of the 8th Saudi Students Conference, 359-374, World Scientific Publishing Co., DOI: 10.1142/9781783269150_0031.
  • Ketab, SS., Clarke, N., Haskell-Dowland, P., (2015), E-Invigilation of E-Assessments. Proceedings of the 9th International Technology, Education and Development Conference, 1582-1591, IATED Academy.

Research Student Supervision

Principal Supervisor

  • Doctor of Philosophy: Active Security Vulnerability Notification and Resolution
  • Doctor of Philosophy: Graphical One-Time-Password Authentication
  • Master by Research: Data Mining Applied to External Marketing Data
  • Doctor of Philosophy: Behaviour Profiling for Mobile Devices
  • Doctor of Philosophy: E-Invigilator of E-Assessment
  • Doctor of Philosophy: Opportunities and Risks in Online Gaming Environments
  • Doctor of Philosophy: Increasing eLearning Engagement Through Mobile Learning Integration
  • Doctor of Philosophy: Enhancing Usability Using Automated Security Interface Adaption (ASIA)
  • Doctor of Philosophy: Improved Composability of Software Components Through Parallel Hardware Platforms for In-Car Multimedia Systems
  • Doctor of Philosophy: Establishing an Information Security Awareness and Culture
  • Doctor of Philosophy: High Performance Near-Time Processing of Bulk Data
  • Doctor of Philosophy: The Role of Security and Its Antecedents in e-Government Adoption
  • Doctor of Philosophy: Enhancing User Authentication Using Graphical Techniques
  • Master of Science (Computer Science),  The challenges of digital legacy management on the value of digital objects to older Australians

Associate Supervisor

  • Continuous Identity Verification in Cloud Computing Services
  • Doctor of Philosophy: Activity-Based User Authentication Using Smartwatches
  • An Evaluation of Targeted Security Awareness for End Users
  • DOKY: A Multi-Modal User Interface for Non-Visual Presentation, Navigation and Manipulation of Structured Documents on Mobile and Wearable Devices
  • Bioelectrical User Authentication
Skip to top of page