Top of page
Global Site Navigation

School of Science

Local Section Navigation
You are here: Main Content

Associate Professor Paul Haskell-Dowland

Associate Dean

Contact Information Telephone: +61 8 6304 5039, Email: p.haskelldowland@ecu.edu.au, Campus: Joondalup, Room: JO18.312
Staff Member Details
Telephone: +61 8 6304 5039
Email: p.haskelldowland@ecu.edu.au
Campus: Joondalup  
Room: JO18.312  

 

Paul is an Associate Professor and Associate Dean (Computing and Security) in the School of Science.

Background

Associate Professor Paul Haskell-Dowland is the Associate Dean for Computing and Security in the School of Science at Edith Cowan University and is an associate member of the Centre for Security, Communications & Network Research at Plymouth University (UK).  Paul has delivered keynotes, invited presentations, workshops, professional development/training and seminars across the world for audiences including Sri Lanka CERT, ITU and IEEE. He has more than 20 years of experience in cyber security research and education in both the UK and Australia.

Paul is the Working Group Coordinator and the ACS/Australian Country Member Representative to the International Federation for Information Processing (IFIP) Technical Committee 11 (TC11 - Security and Privacy Protection in Information Processing Systems), the secretary to IFIP Working Group 11.1 (Information Security Management), the ACS representative to Standards Australia for Risk Management (OB 007) and a member of the ACS Cyber Security Committee, a Fellow of the Higher Education Authority, a Senior Member of the IEEE, an Honorary Fellow of the Sir Alister Hardy Foundation for Ocean Science, a Fellow of the BCS and a Senior Member of the ACS/Certified Professional. He is the author of over 70 papers in refereed international journals and conference proceedings and edited 29 proceedings.

Together with colleagues at Plymouth University (Dr Bogdan Ghita and Prof. Steven Furnell), Paul co-invented the ICAlert platform. ICAlert is a managed device that monitors Internet access (initially aimed at primary and secondary schools), targeting users attempting to access illegal content (child abuse images) as well as terrorist content.  In February 2017, following several years of trials, a commercial product was launched in collaboration with the SouthWest Grid for Learning and the Internet Watch Foundation.

Professional Memberships

  • Working Group Coordinator, IFIP TC11, June 2017
  • Senior Member of the ACS - Certified Professional MACS (Snr) CP and IP3P, December 2016
  • SMIEEE (Senior Member of the IEEE), April 2016
  • Member of the Council of Professors and Heads of Computing (CPHC), September 2015
  • MIEEE (Member of the IEEE), August 2015
  • FBCS (Fellow of British Computer Society), September 2010
  • IFIP Silver Core recipient, 2010
  • Member of the IFIP TC 11 Working Group 11.12 on Human Aspects of Information Security and Assurance
  • Secretary & Webmaster, IFIP TC11 Working Group 11.1 on Information Security Management, August 2004
  • Branch Committee Member & Webmaster, BCS South West, April 2004-2016
  • MBCS (Member of British Computer Society), April 2004

Research Areas and Interests

  • Network and System Security
  • Teaching and Learning Technologies
  • Learner and Learning Analytics
  • Security Education
  • Child eSafety
  • Network Monitoring
  • Misuse Detection
  • Authentication Technologies

Qualifications

  • Doctor of Philosophy, United Kingdom, 2004.
  • Postgraduate Certificate in Learning and Teaching in Higher, United Kingdom, 2001.
  • Bachelor of Science with First Class Honours, England, 1998.

Research

Recent Research Grants

  • Measuring and Mitigating Vigilance Decrement in Cyber Network Defence Tasks,  Cyber Security Research Centre Ltd,  Cyber Security Research Centre PhD Scholarship,  2019 - 2022,  $225,000.
  • Academic Centre of Cyber Security Excellence,  Department of Education and Training,  Academic Centres of Cyber Security Excellence,  2017 - 2021,  $950,287.
  • Intelligent Building Security: An investigation into Vulnerabilities, Current Practice and Security Management Best Practice,  ASIS International,  ASIS - Grant,  2017 - 2018,  $79,339.

Recent Publications (within the last five years)

Journal Articles

  • Al-Bayati, B., Clarke, N., Haskell-Dowland, P., Li, F., (2019), Behavioral Profiling for Transparent Verification in Cloud Storage Services. Journal of Information Warfare, 17(4), 88-105, Virginia, USA, School of Computer and Information Science.
  • Chaudhry, J., Saleem, K., Haskell-Dowland, P., Miraz, M., (2018), A Survey of Distributed Certificate Authorities in MANETs. Annals of Emerging Technologies in Computing (AETiC), 2(3), 11-18, International Association of Educators and Researchers (IAER).
  • Korovessis, P., Furnell, S., Papadaki, M., Haskell-Dowland, P., (2017), A toolkit approach to information security awareness and education. Journal of Cybersecurity Education, Research and Practice, 2017(2), article no.5, Kennesaw State University.
  • Alharbi, N., Papadaki, M., Haskell-Dowland, P., (2017), The impact of security and its antecedents in behaviour intention of using e-government services. Behaviour and Information Technology, 36(6), 620-636, Taylor & Francis, DOI: 10.1080/0144929X.2016.1269198.
  • Al-Bayati, B., Clarke, N., Haskell-Dowland, P., (2016), Adaptive Behavioral Profiling for Identity Verification in Cloud Computing: A Model and Preliminary Analysis. The GSTF Journal on Computing, 5(1), 21-28, Singapore, Global Science and Technology Forum, DOI: 10.5176/2251-3043_4.4.348.
  • Zaaba, ZF., Furnell, S., Haskell-Dowland, P., (2016), Literature Studies on Security Warnings Development. International Journal on Perceptive and Cognitive Computing, 2(1), 8-18, Malaysia, International Islamic University Malaysia, DOI: 10.31436/ijpcc.v2i1.22.
  • Al-Naffakh, N., Clarke, N., Haskell-Dowland, P., Li, F., (2016), A Comprehensive Evaluation of Feature Selection for Gait Recognition Using Smartwatches. International Journal for Information Security Research, 6(3), 691-700, Infonomics Society, DOI: 10.20533/ijisr.2042.4639.2016.0080.
  • Alsaiari, H., Papadaki, M., Haskell-Dowland, P., Furnell, S., (2016), Graphical One-Time Password (GOTPass): A usability evaluation. Information Security Journal: a Global Perspective, 25(1-3), 94-108, United States, Taylor and Francis Inc., DOI: 10.1080/19393555.2016.1179374.
  • Alsaiari, H., Papadaki, M., Haskell-Dowland, P., Furnell, S., (2015), Secure Graphical One Time Password (GOTPass): An Empirical Study. Information Security Journal: a Global Perspective, 24(4-6), 207-220, United States, Taylor & Francis Inc., DOI: 10.1080/19393555.2015.1115927.
  • Li, F., Clarke, N., Papadaki, M., Haskell-Dowland, P., (2014), Active Authentication for Mobile Devices Utilising Behaviour Profiling. International Journal of Information Security, 13(3), 229-244, Germany, Springer, DOI: 10.1007/s10207-013-0209-6.
  • Jali, MZ., Furnell, S., Haskell-Dowland, P., (2014), Investigating the Viability of Multifactor Graphical Passwords for User Authentication. Information Security Journal, 23(1-2), 10-21, Taylor and Francis, DOI: 10.1080/19393555.2014.891274.
  • Alharbi, N., Papadaki, M., Haskell-Dowland, P., (2014), Security Factors Influencing End Users' Adoption of E-Government. Journal of Internet Technology and Secured Transaction, 3(4), 320-328, Infonomics Society, DOI: 10.20533/jitst.2046.3723.2014.0040.

Conference Publications

  • Vasileiou, I., Haskell-Dowland, P., (2019), Addressing STEM Geek Culture Through Peer Learning. EDULEARN19 Proceedings, 5289-5293, Palma, Mallorca, Spain, IATED Academy, DOI: 10.21125/edulearn.2019.1298.
  • Ellis, M., Thompson, G., Haskell-Dowland, P., (2019), From Model B To Micro:Bit – Teaching Computer Science. Proceedings of EDULEARN19 Conference, 2725-2731, Palma, Mallorca, Spain, IATED Academy, DOI: 10.21125/edulearn.2019.0744.
  • Mahmoud, N., Furnell, S., Haskell-Dowland, P., (2018), Design Principles and Guidelines for Targeted Security Awareness. Proceedings of the Annual Information Institute Conference, 18p., online, Information Institute.
  • Al-Bayati, B., Clarke, N., Haskell-Dowland, P., Li, F., (2018), Continuous identity verification in cloud storage services using behavioural profiling. ECCWS 2018 17th European Conference on Cyber Warfare and Security, 10p..
  • Al-Bayati, B., Clarke, N., Haskell-Dowland, P., Li, F., (2018), Misuse Detection in a Simulated IaaS Environment. Emerging Technologies for Authorization and Authentication. ETAA 2018. Lecture Notes in Computer Science, 11263(7 Sept 2018), 103-115, Switzerland, Springer, DOI: 10.1007/978-3-030-04372-8_9.
  • Enamamu, T., Clarke, N., Haskell-Dowland, P., Li, F., (2017), Transparent Authentication: Utilising Heart Rate for User Authentication. International Conference for Internet Technology and Secured Transactions (ICITST-2017) Proceedings, 283-289.
  • Mahmoud, N., Furnell, S., Haskell-Dowland, P., (2017), Towards Targeted Security Awareness Raising. Proceedings of the Annual Information Institute Conference, 13p., Information Institute.
  • Al-Naffakh, NH., Clarke, N., Li, F., Haskell-Dowland, P., (2017), Unobtrusive Gait Recognition using Smartwatches. Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI), LNI P-270(20-22 Sept 2017), 211-218, IEEE, DOI: 10.23919/BIOSIG.2017.8053523.
  • Enamamu, T., Clarke, N., Haskell-Dowland, P., Li, F., (2017), Smart Watch based Body-Temperature Authentication. Proceedings of the IEEE International Conference on Computing, Networking and Informatics (ICCNI 2017), 7p., IEEE, DOI: 10.1109/ICCNI.2017.8123790.
  • Ketab, S., Clarke, N., Haskell-Dowland, P., (2016), The Value of the Biometrics in Invigilated E-Assessments. EDULEARN16 Conference Proceedings, 7648-7659, online only, IATED Academy, DOI: 10.21125/edulearn.2016.0687.
  • Ai-Naffakh, N., Clarke, N., Haskell-Dowland, P., Li, F., (2016), Activity Recognition using wearable computing. h International Conference for Internet Technology and Secured Transactions, ICITST 2016, 189-195, Piscataway, USA, Institute of Electrical and Electronics Engineers Inc., DOI: 10.1109/ICITST.2016.7856695.
  • Alsaiari, H., Papadaki, M., Haskell-Dowland, P., Furnell, S., (2016), A review of graphical authentication utilising a keypad input method. Proceedings of the 8th Saudi Students Conference, 359-374, World Scientific Publishing Co., DOI: 10.1142/9781783269150_0031.
  • Triantafyllidis, A., Clarke, N., Haskell-Dowland, P., Vranopoulos, G., (2016), Increasing eLearning Engagement Using Mobile Technologies. ICERI2016 Conference Proceedings, 8644-8653, online only, IATED Academy.
  • Ketab, SS., Clarke, N., Haskell-Dowland, P., (2015), E-Invigilation of E-Assessments. Proceedings of the 9th International Technology, Education and Development Conference, 1582-1591, IATED Academy.
  • Alsaiari, H., Papadaki, M., Haskell-Dowland, P., Furnell, SM., (2014), Alternative Graphical Authentication for Online Banking Environments. Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, 122-136, CSCAN.
  • Dorigo, ML., Harriehausen-Mühlbauer, B., Stengel, I., Haskell-Dowland, P., (2014), Nonvisual presentation, navigation and manipulation of structured documents on mobile and wearable devices. Lecture Notes in Computer Science, 8547 LNCS(9-11 Jul, 2014), 383-390, Springer, DOI: 10.1007/978-3-319-08596-8_59.
  • Knirsch, A., Wietzke, J., Moore, R., Haskell-Dowland, P., (2014), Connected in-car multimedia: Qualities affecting composability of dynamic functionality. Proceedings of the Tenth International Network Conference, 81-93, Plymouth University.
  • Alharbi, N., Papadaki, M., Haskell-Dowland, P., (2014), Security Challenges of E-Government Adoption Based On End Users’ Perspective. Internet Technolgy and Secured Transactions (ICITST), 2014 9th International Conference for, 78-82, IEEE, DOI: 10.1109/ICITST.2014.7038781.

Research Student Supervision

Principal Supervisor

  • Doctor of Philosophy: The Role of Security and Its Antecedents in e-Government Adoption
  • Doctor of Philosophy: Opportunities and Risks in Online Gaming Environments
  • Doctor of Philosophy: Increasing eLearning Engagement Through Mobile Learning Integration
  • Doctor of Philosophy: Improved Composability of Software Components Through Parallel Hardware Platforms for In-Car Multimedia Systems
  • Doctor of Philosophy: Enhancing Usability Using Automated Security Interface Adaption (ASIA)
  • Master of Science (Computer Science),  THE CHALLENGES OF DIGITAL LEGACY MANAGEMENT ON THE VALUE OF DIGITAL OBJECTS TO OLDER AUSTRALIANS
  • Doctor of Philosophy: Enhancing User Authentication Using Graphical Techniques
  • Doctor of Philosophy: Active Security Vulnerability Notification and Resolution
  • Doctor of Philosophy: Graphical One-Time-Password Authentication
  • Doctor of Philosophy: E-Invigilator of E-Assessment
  • Doctor of Philosophy: Behaviour Profiling for Mobile Devices
  • Doctor of Philosophy: High Performance Near-Time Processing of Bulk Data
  • Master by Research: Data Mining Applied to External Marketing Data
  • Doctor of Philosophy: Establishing an Information Security Awareness and Culture

Associate Supervisor

  • Continuous Identity Verification in Cloud Computing Services
  • DOKY: A Multi-Modal User Interface for Non-Visual Presentation, Navigation and Manipulation of Structured Documents on Mobile and Wearable Devices
  • Bioelectrical User Authentication
  • An Evaluation of Targeted Security Awareness for End Users
Skip to top of page