Professor Paul Haskell-Dowland is the Professor of Cyber Security Practice and Associate Dean for Computing and Security in the School of Science at Edith Cowan University, Perth, Australia. Paul has delivered keynotes, invited presentations, workshops, professional development/training and seminars across the world for audiences including RSA Security, ITU and IEEE. He has appeared on local, national and international media (newspaper, radio and tv) commenting on current cyber issues with a global audience reach of more than three billion people. His contributions through articles published in The Conversation have reached over four million readers - joining the top-50 all-time authors in Australia/New Zealand. Paul has more than 25 years of experience in cyber security research and education leadership in both the UK and Australia.
Australian Research Council, General Assessor and Selection Advisory Committee panel member for Industrial Transformation Research Program (Research Hubs and Training Centres) (2018, 2019)
Working Group Coordinator, IFIP TC11, 2017-2022
Reviewer for National Research Foundation (NRF), South Africa
External examiner, MSc Information Technology and MSc Software Development at the University of Glasgow, January 2014 - December 2016
Branch Committee Member & Webmaster, BCS South West, April 2004-2016
External examiner, Information Technology, Information Technology with Management, Information Technology with Economics, Business Information Technology awards at the University of Reading, October 2007 - September 2011
External examiner, MSc Computing, Computer Science, Forensic Computing, Distance Learning, Multimedia and Web Multimedia awards at the University of Stafford, January 2007 - December 2011
SAHFOS Honorary Fellow in recognition of work to develop the WinCPR, North Sea Plankton Database, April 2005 (renewed 2015)
Programme validation event - external panel member, University of Portsmouth, May 2005
Programme validation event - external panel member, University of Greenwich at Medway, March 2005
Awards
'Most prolific author from ECU for The Conversation in 2023', 2023
Best Expert Commentary – ECU Media Awards, Highly Commended, 2023
Most Widely Read Story by an ECU Researcher – ECU Media Awards, Highly Commended, 2023
Honour Award for Outstanding Contributions to the Media in 2022
'Most prolific author from ECU for The Conversation in 2022', 2022
Outstanding Research Communication, ECU Vice-Chancellor's Staff Award 2022
An investigation into privacy and cyber security elements for operational C-ITS, iMOVE Australia Limited, iMOVE CRC, 2024 ? 2025, AUD $448,400
Sharing Cybersercurity Research Data SCReeD, Cyber Security Research Centre Ltd, Grant, 2022 - 2024, AUD $100,000
Augmenting Cyber Defence Capability (ACDC), Cyber Security Research Centre Ltd, Grant, 2022 - 2024, AUD $885,000
Cyber training – Incident Analyst, Department of Defence, 2022-2023, AUD $1,945,356
Semantic modelling of Digital Twins for Cyber Security Defence Automation, Commonwealth Scientific and Industrial Research Organisation (CSIRO), 2021 - 2024, AUD $150,000
Cyber training – Incident Analyst, Department of Defence, 2021-2022, AUD $1,884,774
In-Circuit Forensic Analysis of IoT Memory Modules, Cyber Security Research Centre Ltd, Cyber Security Research Centre PhD Scholarship, 2020 - 2023, AUD $180,000
Data – Increased cybersecurity risk from working at home, Department of Jobs, Tourism, Science and Innovation, Covid-19 Research Fund, 2020 - 2022, AUD $135,554
Heterogeneous Anomaly Detection from Network Traffic Streams using Data Summarization, Cyber Security Research Centre Ltd, Cyber Security Research Centre Masters Scholarship, 2020 - 2022, AUD $120,000
Co-ordinated as CRC Theme Lead
Postdoc funding theme 2.4 - #1, Cyber Security Research Centre Ltd, Cyber Security Research Centre PostDoc Scholarship, 2019-2022, AUD $501,150
Postdoc funding theme 2.4 - #2, Cyber Security Research Centre Ltd, Cyber Security Research Centre PostDoc Scholarship, 2019-2022, AUD $500,765
Honeypot Deployment Architecture, Cyber Security Research Centre Ltd, Cyber Security Research Centre MBR Scholarship, 2019-2021, AUD $130,000
The lived experience of hacking victims: Implications for support and prevention, Cyber Security Research Centre Ltd, Cyber Security Research Centre Honours Scholarship, 2019, AUD $35,000
Measuring and Mitigating Vigilance Decrement in Cyber Network Defence Tasks, Cyber Security Research Centre Ltd, Cyber Security Research Centre PhD Scholarship, 2019 - 2022, AUD $225,000
IoT Testbed, 2018. AUD $20,000. Co-Investigator. The proposed IoT testbed will enable the School of Science to establish an IoT based infrastructure with various sensors, connected to a virtualised platform that would enable researchers and lecturers to simulate various use-cases and scenarios, taking into consideration the dynamic cyber threat landscape within the IoT space.
Innovation and Entrepreneurship in the Digital Economy, 2017, AUD $20,300, Co-Investigator. This project investigates the digital economy through the lens of innovation and entrepreneurship. It also activates local and regional partnerships to support this research and initiate research knowledge translation. It proposes a collaborative Industry/University workshop and research project with data gathering about innovative small and micro-businesses in the digital economy. It brings together ECU experts across the Schools of Business and Law and, Science, together with industry professionals from entrepreneurship, economic development, financial and technology fields.
Academic Centre of Cyber Security Excellence, Department of Education and Training, 2017-2021, AUD $950,288
Intelligent Building Security: An investigation into Vulnerabilities, Current Practice and Security Management Best Practice, March 2017 - June 2018, AUD $79,339, Co-Investigator. The research will develop an evidence based framework of IB vulnerabilities, resulting in guidelines to educate and inform the security professional.
Increasing low SES female participation in computer and security science, Edith Cowan University (Perth, Australia), March 2017 to December 2017, AUD $66,402.40, Co-Lead. This initiative aims to improve: pre-tertiary low SES, and Indigenous, female student understanding of, and aspirations for, Higher Education in the computer and security disciplines. Furthermore, the project is intended to extend secondary teachers (career counsellors) understanding of careers in Computing & Security Science.
KTP Associate Project (Essential 6, Paignton), 2015-2017, funded by the Department of Trade and Industry (DTI) £109,633
Superfast Network Monitoring Project (Cornwall Development Company), 2013-2015, £48,048
Network Monitoring Proof of Concept Project (partners not disclosed), 2012-2015 ~£15,000
e-Invigilator (Teaching Fellowship), 2012-2013
KTP Associate Project (Westland Geo Projects, Bude), 2008-2010, funded by the Department of Trade and Industry (DTI), £109,633
KTP Associate Project (Corpdata, Exeter), 2004-2006, funded by the Department of Trade and Industry (DTI), £99,044
A CD and web-based gridded database and browser for North Atlantic plankton, 2004-2006, funded by the NERC, £49,349
Biometric Terminal - Phase 2, Orange, 2004
Security Technology in a Virtual University (Virtusec), 2003-2005, funded by the British Council in Collaboration with Darmstadt University of Applied Science, £4,000
PC Integrity Testing. Plymouth Trading Standards. 2003-2004: £1,250
Biometric Terminal - Phase 1, Orange, 2003
TCS Associate Project (John Nicholls Builders, Goonhavern), 2002-2004, funded by the Department of Trade and Industry (DTI), project value: £97,653
WinCPR Software Development. SAHFOS. 2002: £4,000
TCS Associate Project (Intasoft Limited, Exeter), 2001-2003, funded by the Department of Trade and Industry (DTI), project value: £88,733
Cybersign, Orange, 1999
Tools for On-Line Distance Learning, 1997-1999
HGML Phase 1, Orange, 1997-1998
Journal papers
Real-world continuous smartwatch-based user authentication Al-Naffakh N, Clarke NL, Li F, Haskell-Dowland PS (Dowland PS) The Computer Journal, Vol. 68, Iss. 1, 2025 More details | External link available
Examination of Traditional Botnet Detection on IoT-Based Bots Woodiss-Field A, Johnstone M, Haskell-Dowland PS (Dowland PS) Sensors, Vol. 24, Iss. 3, pp1027, 2024 More details | External link available
Energy-Efficient Covert Wireless Communication Through Probabilistic Jamming Lu X, Huang Y, Yan S, Yang W, Haskell-Dowland PS (Dowland PS) IEEE Wireless Communications Letters, Vol. 12, Iss. 5, pp932-936, 2023 More details | External link available
Establishment and mapping of heterogeneous anomalies in network intrusion datasets Riddell L, Ahmed M, Haskell-Dowland PS (Dowland PS) Connection Science, Volume 34, Issue 1, pp2755-2783, 2022 More details | External link available
Biometric Security: A Novel Ear Recognition Approach Using a 3D Morphable Ear Model Mursalin M, Ahmed M, Haskell-Dowland PS (Dowland PS) Sensors, 22, 8988, DOI: 10.3390/s22228988, 2022 More details | External link available
Anomaly Detection in Cybersecurity Datasets via Cooperative Co-evolution-based Feature Selection Rashid BANM, Ahmed M, Sikos L, Haskell-Dowland PS (Dowland PS) ACM Transactions on Management Information Systems, Issue 3, No. 29, pp 1–39, 2022 More details | External link available
ECU-IoHT: A dataset for analyzing cyberattacks in Internet of Health Things Ahmed M, Byreddy S, Nutakki A, Sikos L, Haskell-Dowland PS (Dowland PS) Ad Hoc Networks, Vol. 121, ISSN 1570-8705, 2021 More details | External link available
An Energy-Efficient and Secure Data Inference Framework for Internet of Health Things: A Pilot Study Kang J, Dibaei M, Luo G, Yang W, Haskell-Dowland PS (Dowland PS), Zheng X Sensors, Vol. 21, No. 1: 312, 2021 More details | External link available
Cooperative co‑evolution for feature selection in Big Data with random feature grouping Rashid BANM, Ahmed M, Sikos L, Haskell-Dowland PS (Dowland PS) Journal of Big Data, 7, 107, 2020 More details | External link available
No Soldiers Left Behind: An IoT-based Low-Power Military Mobile Health System Design Kang J, Yang W, Dermody G, Ghasemian M, Adibi S, Haskell-Dowland PS (Dowland PS) IEEE Access, ISSN: 2169-3536, Vol. 8, pp201498-201515, 2020 More details | External link available
A Novel Penalty-Based Wrapper Objective Function for Feature Selection in Big Data using Cooperative Co-Evolution Rashid BANM, Ahmed M, Sikos L, Haskell-Dowland PS (Dowland PS) IEEE Access, Vol.8, pp150113 - 150129, 2020 More details | External link available
Intelligent Building Systems: Security and Facility Professionals' Understanding of System Threats, Vulnerabilities and Mitigation Practice Brooks D, Coole M, Haskell-Dowland PS (Dowland PS) Security Journal, Vol. 33 No.2, pp244–265, 2019 More details | External link available
Behavioral Profiling for Transparent Verification in Cloud Storage Services Al-Bayati B, Clarke NL, Haskell-Dowland PS (Dowland PS), Li F Journal of Information Warfare, pp88-105, 2019 More details | External link available
A Survey of Distributed Certificate Authorities in MANETs Chaudhry J, Saleem K, Haskell-Dowland PS (Dowland PS), Miraz M Annals of Emerging Technologies in Computing (AETiC),, vol. 2, iss. 3, pp11-18, 2018 More details | External link available
A toolkit approach to information security awareness and education Korovessis P, Furnell SM, Papadaki M, Haskell-Dowland PS (Dowland PS) Journal of Cybersecurity Education, Research and Practice, Vol. 2017, Iss. 2, Art. 5, ISSN: 2472-2707, 2017 More details | External link available
The impact of security and its antecedents in behaviour intention of using e-government services Alharbi N, Papadaki M, Haskell-Dowland PS (Dowland PS) Journal of Behaviour and Information Technology, ISSN: 0144-929X, Vol 36, Iss 6, pp620-636, 2017 More details | External link available
Literature Studies on Security Warnings Development Zaaba ZF, Furnell SM, Haskell-Dowland PS (Dowland PS) International Journal on Perceptive and Cognitive Computing, Vol 2, Iss 1, pp8-18, 2016 More details | External link available
A Comprehensive Evaluation of Feature Selection for Gait Recognition Using Smartwatches Al-Naffakh N, Clarke NL, Haskell-Dowland PS (Dowland PS), Li F International Journal for Information Security Research, Volume 6, Issue 3, 2016 More details | External link available
Graphical One-Time Password (GOTPass): A usability evaluation Alsaiari H, Papadaki M, Haskell-Dowland PS (Dowland PS), Furnell SM Information Security Journal: a Global Perspective, ISSN: 1939-3547, Vol 25, Iss 1-3, pp94-108, 2016 More details | External link available
Adaptive Behavioral Profiling for Identity Verification in Cloud Computing: A Model and Preliminary Analysis Al-Bayati B, Clarke NL, Haskell-Dowland PS (Dowland PS) GSTF Journal on Computing (JOC), ISSN:2251-3043, Vol. 5, Iss.1, pp21-28, 2016 Winner of the Best Student Paper award at the 7th Annual International Conference on ICT: Big Data, Cloud and Security (ICT-BDCS 2016). More details | External link available
Secure Graphical One Time Password (GOTPass): An Empirical Study Alsaiari H, Papadaki M, Haskell-Dowland PS (Dowland PS), Furnell SM Information Security Journal: A Global Perspective, 24, pp207-220, 2015 More details | External link available
Security Factors Influencing End Users' Adoption of E-Government Alharbi N, Papadaki M, Haskell-Dowland PS (Dowland PS) Journal of Internet Technology and Secured Transaction (JITST), Volume 3, Issues 3/4, pp320-328, 2014 More details | External link available
Investigating the Viability of Multifactor Graphical Passwords for User Authentication Jali MZ, Furnell SM, Haskell-Dowland PS (Dowland PS) Information Security Journal: A Global Perspective, 00:1–12, ISSN: 1939-3555, Published online: 18 Apr 2014, 2014 More details | External link available
Active authentication for mobile devices utilising behaviour profiling Li F, Clarke NL, Papadaki M, Haskell-Dowland PS (Dowland PS) International Journal of Information Security, Volume 13, Issue 3, pp229-244, ISSN:1615-5262, 2014 More details | External link available
Misuse Detection for Mobile Devices Using Behaviour Profiling Li F, Clarke NL, Papadaki M, Haskell-Dowland PS (Dowland PS) International Journal of Cyber Warfare & Terrorism, Volume 1, Issue 1, pp43-55, ISSN: 1947-3435, 2011 More details | External link available
Massively Multi-Player Online Role Playing Games: What’s the Risk? Sanders B, Haskell-Dowland PS (Dowland PS), Atkinson S, Furnell SM Journal of Virtual Worlds Research, vol. 3, no. 3, ISSN: 1941-8477, 2011 More details | External link available
Online Addiction: A Cultural Comparison of Privacy Risks in Online Gaming Environments Sanders B, Haskell-Dowland PS (Dowland PS), Atkinson S, Zahra D, Furnell SM, Papadaki M Journal of Multimedia Processing Technologies, vol. 1, no. 3, September, pp181-193, ISSN: 0976-4127, 2010 More details | External link available
Assessing image-based authentication techniques in a web-based environment Jali MZ, Furnell SM, Haskell-Dowland PS (Dowland PS) Information Management & Computer Security, Vol.18, Iss.1, pp43-53, 2010 More details | External link available
An automated framework for managing security vulnerabilities Alayed A, Furnell SM, Zhao D, Haskell-Dowland PS (Dowland PS) Information Management & Computer Security, vol. 13, no. 2, pp156-166, 2005 More details | External link available
A long-term trial of alternative user authentication technologies Furnell SM, Papadopoulos I, Haskell-Dowland PS (Dowland PS) Information Management and Computer Security, Vol. 12, No. 2, pp178-190, 2004 More details | External link available
A prototype tool for information security awareness and training Furnell SM, Gennatou M, Haskell-Dowland PS (Dowland PS) International Journal of Logisitics Information Management, vol. 15, no. 5, pp352-357, 2002 More details | External link available
An experimental comparison of secret-based user authentication<br />technologies Irakleous I, Furnell SM, Haskell-Dowland PS (Dowland PS), Papadaki M Information Management and Computer Security, vol. 10, no. 3, pp100-108, 2002 More details | External link available
Security analysers: Administrator Assistants or Hacker Helpers? Furnell SM, Chiliarchaki P, Haskell-Dowland PS (Dowland PS) Information Management and Computer Security, vol. 9, no.2, pp93-101, 2001 More details | External link available
Authentication and Supervision: A survey of user attitudes Furnell SM, Haskell-Dowland PS (Dowland PS), Illingworth HM, Reynolds PL Computers & Security, vol. 19, no. 6, pp529-539, 2000 Please note: the electronic copy of the survey referred to in this paper is no longer available. More details | External link available
A conceptual architecture for real-time intrusion monitoring Furnell SM, Haskell-Dowland PS (Dowland PS) Information Management and Computer Security, vol. 8, no. 2, pp65-74, 2000 More details | External link available
Computer Crime and Abuse: A Survey of Public Attitudes and Awareness Haskell-Dowland PS (Dowland PS), Furnell SM, Illingworth HM, Reynolds PL Computers & Security, vol. 18, no. 8, pp715-726, 1999 Please note: the electronic copy of the survey referred to in this paper is no longer available. More details | External link available
Dissecting the 'Hacker Manifesto' Furnell SM, Haskell-Dowland PS (Dowland PS), Sanders P Information Management and Computer Security, vol.7, no.2 pp69-75, 1999 More details | External link available
37 Journal papers
Conference papers
On Relaying Strategies in Multi-Hop Covert Wireless Communications Yu X, Yan S, Hu J, Haskell-Dowland PS (Dowland PS), Han Y, Ng DWK IEEE International Conference on Communications, pp666-672, DOI: 10.1109/ICC45855.2022.9838514, 2022 More details | External link available
Towards Evaluating the Effectiveness of Botnet Detection Techniques Woodiss-Field A, Johnstone M, Haskell-Dowland PS (Dowland PS) International Conference on Ubiquitous Security (UBISEC 2021), pp 292-308 (published 2022), Springer, DOI: 10.1007/978-981-19-0468-4_22, 2021 More details | External link available
IoT Threat Detection Advances, Challenges and Future Directions Karie NM, Sahri NM, Haskell-Dowland PS (Dowland PS) 2020 Workshop on Emerging Technologies for Security in IoT (ETSecIoT), 21-21 April, Sydney, Australia, 2020 More details | External link available
Building a Better Micro:Bit IDE – Teaching Computer Science Ellis M, Thompson G, Haskell-Dowland PS (Dowland PS) INTED2020 Proceedings of the 14th International Technology, Education and Development Conference, Valencia, Spain, 2-4 March, ISBN: 978-84-09-17939-8, pp8425-8433, 2020 More details | External link available
The Hop Portal Snowglobe Architecture: Making Virtual Reality Functional Chady T, Haskell-Dowland PS (Dowland PS) INTED2020 Proceedings of the 14th International Technology, Education and Development Conference, Valencia, Spain, 2-4 March, ISBN: 978-84-09-17939-8, pp8395-8403, 2020 More details | External link available
Good guidance or mistaken misdirection: Assessing the quality of password advice Furnell SM, Haskell-Dowland PS (Dowland PS) Proceedings of the Annual Information Institute Conference, 2020 Information Institute Las Vegas Conference, 2020 More details | External link available
Hybrid Routing for Man-in-the-Middle (MITM) Attack Detection in IoT Networks Kang J, Fahd K, Venkatraman S, Trujillo-Rasua R, Haskell-Dowland PS (Dowland PS) 2019 29th International Telecommunication Networks and Applications Conference (ITNAC), ISBN: 978-1-7281-3674-5, pp. 1-6, 2019 More details | External link available
Addressing STEM Geek Culture Through Peer Learning Vasileiou I, Haskell-Dowland PS (Dowland PS) EDULEARN19 Proceedings, pp5289-5293, Palma, Mallorca, Spain, 2019 More details | External link available
From Model B To Micro:Bit – Teaching Computer Science Ellis M, Thompson G, Haskell-Dowland PS (Dowland PS) Proceedings of EDULEARN19 Conference, pp2725-2731, Palma, Mallorca, Spain, 2019 More details | External link available
Design Principles and Guidelines for Targeted Security Awareness Mahmoud N, Furnell SM, Haskell-Dowland PS (Dowland PS) Proceedings of the Annual Information Institute Conference, March 26-28, Las Vegas, USA, ISBN: 978-1-935160-19-9, 2018 More details | External link available
Misuse Detection in a Simulated IaaS Environment Al-Bayati B, Clarke NL, Haskell-Dowland PS (Dowland PS), Li F 1st International Workshop on Emerging Technologies for Authorization and Authentication, ISBN: 978-3-030-04371-1, pp103-115, 2018 More details | External link available
Continuous identity verification in cloud storage services using behavioural profiling Al-Bayati B, Clarke NL, Haskell-Dowland PS (Dowland PS), Li F 17th European Conference on Cyber Warfare and Security ECCWS 2018, 28-29 June, ISBN: 978-1-911218-85-2, pp1-10, 2018 More details | External link available
Transparent Authentication: Utilising Heart Rate for User Authentication Enamamu T, Clarke NL, Haskell-Dowland PS (Dowland PS), Li F International Conference for Internet Technology and Secured Transactions (ICITST-2017) , pp283-289, ISBN:978-1-9083-207-97, 2017 More details | External link available
Body Temperature Authentication for Secure Smartwatch to Smart Device Communication Enamamu T, Clarke NL, Haskell-Dowland PS (Dowland PS), Li F Proceedings of the IEEE International Conference on Computing, Networking and Informatics (ICCNI 2017) , ISBN: 978-1-5090-4643-0, pp1-7, 2017 More details | External link available
Unobtrusive Gait Recognition Using Smartwatches Al-Naffakh N, Clarke NL, Li F, Haskell-Dowland PS (Dowland PS) International Conference of the Biometrics Special Interest Group (BIOSIG), 20-22 September, Darmstadt, Germany, pp211-218, ISBN 978-3-88579-664-0, 10.23919/BIOSIG.2017.8053523, 2017 More details | External link available
Towards Targeted Security Awareness Raising Mahmoud N, Furnell SM, Haskell-Dowland PS (Dowland PS) Proceedings of the Annual Information Institute Conference, 18-20 April, Las Vegas, USA, ISBN: 978-1-935160-18-2, 2017 More details | External link available
Activity Recognition using wearable computing Al-Naffakh N, Clarke NL, Haskell-Dowland PS (Dowland PS), Li F 11th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 189-195, Barcelona, Spain, 2016 More details | External link available
Increasing eLearning Engagement Using Mobile Technologies Triantafyllidis A, Clarke NL, Haskell-Dowland PS (Dowland PS), Vranopoulos G 9th annual International Conference of Education, Research and Innovation (ICERI2016), 14-16 November, Seville, Spain, pp8644-8653, ISBN: 978-84-617-5895-1, ISSN: 2350-1095, 2016 More details | External link available
The Value of the Biometrics in Invigilated E-Assessments Ketab S, Clarke NL, Haskell-Dowland PS (Dowland PS) Proceedings of the the 8th Annual International Conference on Education and New Learning Technologies, Barcelona, Spain, 4-6 July, ISBN: 978-84-608-8860-4, ISSN: 2340-1117, 2016 More details | External link available
A Review of Graphical Authentication Utilising a Keypad Input Method Alsaiari H, Papadaki M, Haskell-Dowland PS (Dowland PS), Furnell SM Proceedings of The 8th Saudi Students Conference, January 31 - February 1, pp359-374, 2015 More details | External link available
E-Invigilation of E-Assessments Ketab S, Clarke NL, Haskell-Dowland PS (Dowland PS) Proceedings of INTED2015 Conference 2nd-4th March 2015, Madrid, Spain, ISBN: 978-84-606-5763-7, 2015 More details
Nonvisual Presentation, Navigation and Manipulation of Structured Documents on Mobile and Wearable Devices Dorigo M, Harriehausen-Mühlbauer B, Stengel I, Haskell-Dowland PS (Dowland PS) International Conference on Computers for Handicapped Persons, ISBN: 978-3-319-08595-1, pp383-390, 2014 More details | External link available
Security challenges of e-government adoption based on end users' perspective Alharbi N, Papadaki M, Haskell-Dowland PS (Dowland PS) Proceedings of the 9th International Conference for Internet Technology and Secured Transactions (ICITST 2014), London, UK, pp78-82, ISBN: 978-1-908320-39-1, 2014 More details | External link available
Alternative Graphical Authentication for Online Banking Environments Alsaiari H, Papadaki M, Haskell-Dowland PS (Dowland PS), Furnell SM Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2014), Plymouth, UK, July 8-9, pp122-136, ISBN: 978-1-84102-375-5, 2014 Can be ordered on-line. More details
Connected In-Car Multimedia: Qualities Affecting Composability of Dynamic Functionality Knirsch A, Wietzke J, Moore R, Haskell-Dowland PS (Dowland PS) Proceedings of the Tenth International Network Conference (INC 2014), Plymouth, UK, July 8-9, pp81-93, ISBN: 978-1-84102-373-1, 2014 Can be ordered on-line. More details
Nonvisual Presentation and Navigation within the Structure of Digital Text-Documents on Mobile Devices Dorigo M, Harriehausen-Mühlbauer B, Stengel I, Haskell-Dowland PS (Dowland PS) 7th International Conference, UAHCI 2013, Las Vegas, NV, USA, July 21-26, ISBN: 978-3-642-39193-4, pp311-320, 2013 More details | External link available
Learning management systems in higher education: a faculty perspective Triantafyllidis A, Clarke NL, Haskell-Dowland PS (Dowland PS) 6th International Conference of Education, Research and Innovation (ICERI2013), Madrid, Spain, ISBN: 978-84-616-3847-5, pp5120-5130, 2013 More details | External link available
E-Invigilator: A Biometric-Based Supervision System for e-Assessments Clarke NL, Haskell-Dowland PS (Dowland PS), Furnell SM The International Conference on Information Society (i-Society 2013), Toronto, Canada, 24-26 June, 2013 More details
Learning management systems in higher education: a student perspective Triantafyllidis A, Clarke NL, Haskell-Dowland PS (Dowland PS) 5th International Conference of Education, Research and Innovation (ICERI2012), Madrid, Spain, ISBN: 978-84-616-0763-1, pp4046-4055, 2012 More details | External link available
Assessing the usability of application level security warnings Zaaba ZF, Furnell SM, Haskell-Dowland PS (Dowland PS), Stengel I Eleventh Annual Security Conference, Las Vegas, Nevada, US, 11-13 April, 2012 More details
Teleoperation of mobile robots over wireless internet Dorigo M, Harriehausen-Mühlbauer B, Stengel I, Haskell-Dowland PS (Dowland PS) Proceedings of the 4th International Conference on Internet Technologies and Applications, ITA 11; Wrexham, Wales; United Kingdom, ISBN:978-094688168-0, pp145-151, 2011 More details
Survey: improving document accessibility from the blind and visually impaired user's point of view Dorigo M, Harriehausen-Mühlbauer B, Stengel I, Haskell-Dowland PS (Dowland PS) Proceedings of the 6th International Conference on Universal Access in Human-Computer Interaction. Applications and Services, pp129-135, 978-3-642-21656-5, 2011 More details | External link available
Multifactor Graphical Passwords: An Assessment of End-User Performance Jali MZ, Furnell SM, Haskell-Dowland PS (Dowland PS) Proceedings of the 7th International Conference of Information Assurance & Security (IAS2011), Melaka, Malaysia, 5-8 December 2011. IEEE 978-1-4577-2153-3, 2011 More details
Quantifying the effect of graphical password guidelines for better security Jali MZ, Furnell SM, Haskell-Dowland PS (Dowland PS) Future Challenges in Security and Privacy for Academia and Industry (SEC 2011), Lucerne, Switzerland, 7-9 June 2011. Volume 354/2011, Springer-Verlag, pp80-91, 2011 More details | External link available
Resource Management for Multicore Aware Software Architectures of In-Car Multimedia Systems Knirsch A, Wietzke J, Moore R, Haskell-Dowland PS (Dowland PS) Lecture Notes in Informatics (LNI) - Proceedings, Series of the Gesellschaft für Informatik (GI), Volume P-192, 9th Workshop Automotive Software Engineering, INFORMATIK 2011: Informatik schafft Communities, 4.–7. October 2011, Berlin, p216, ISBN: 978-3-88579-286-4, (full text is available online), 2011 More details | External link available
Emerging risks in massively multiplayer online role playing games Sanders B, Atkinson S, Haskell-Dowland PS (Dowland PS), Furnell SM, Papadaki M EU Kids Online Conference, Friday 23 September, New Academic Building LSE, 2011 More details | External link available
Behaviour Profiling for Transparent Authentication for Mobile Devices Li F, Clarke NL, Papadaki M, Haskell-Dowland PS (Dowland PS) Proceedings of the 10th European Conference on Information Warfare and Security (ECIW), Tallinn, Estonia 7-8 July, pp307-314, 2011 Awarded best PhD paper. More details
End-User Perception and Usability of Information Security Zaaba ZF, Furnell SM, Haskell-Dowland PS (Dowland PS) Proceedings of the Fifth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2011), London, UK, ISBN: 978-1-84102-284-0, pp97-107, 2011 Can be ordered on-line. More details
Online Addiction: Privacy Risks in Online Gaming Environments Sanders B, Chen V, Zahra D, Haskell-Dowland PS (Dowland PS), Atkinson S, Papadaki M, Furnell SM Proceedings of the International Conference on Management of Emergent Digital EcoSystems (MEDES), October 26-29, Bangkok, Thailand, 2010 More details
Behaviour Profiling on Mobile Devices Li F, Clarke NL, Papadaki M, Haskell-Dowland PS (Dowland PS) International Conference on Emerging Security Technologies, 6-8 September, Canterbury, UK, pp77-82, 2010 More details | External link available
Implications and Risks of MMORPG Addiction: Motivations, Emotional Investment, Problematic Usage and Personal Privacy Sanders B, Haskell-Dowland PS (Dowland PS), Furnell SM Proceedings of the South African Information Security Multi-Conference (SAISMC 2010), Port Elizabeth, South Africa, 17-18 May, ISBN: 978-1-84102-256-7, pp61-73, 2010 Can be ordered on-line. More details
A Critical Evaluation of an Online Peer Assessment System (OPAS) Clarke NL, Haskell-Dowland PS (Dowland PS) Proceedings of the International Conference of Education, Research and Innovation (ICERI 2009), 16-18th November, Madrid, Spain, 2009 More details
Evaluating Web-Based User Authentication using Graphical Techniques Jali MZ, Furnell SM, Haskell-Dowland PS (Dowland PS) Proceedings of the Third International Symposium on Human Aspects of Information Security & Assurance (HAISA 2009), Athens, Greece, ISBN: 978-1-84102-231-4, pp108-118, 2009 Can be ordered on-line. More details
An Assessment of People’s Vulnerabilities in Relation to Personal and Sensitive Data Sanders B, Haskell-Dowland PS (Dowland PS), Furnell SM Proceedings of the Third International Symposium on Human Aspects of Information Security & Assurance (HAISA 2009), Athens, Greece, ISBN: 978-1-84102-231-4, pp50-60, 2009 Can be ordered on-line. More details
Service-Oriented Architecture: Performance Issues and Approaches Swientek M, Bleimann U, Haskell-Dowland PS (Dowland PS) Proceedings of the Seventh International Network Conference (INC2008), Plymouth, UK, 8-10 July, pp261-269, 2008 Can be ordered on-line. More details
A practical usability evaluation of security features in end-user applications Furnell SM, Katsabas D, Haskell-Dowland PS (Dowland PS), Reid F Proceedings of the 22nd IFIP International Information Security Conference (IFIP SEC 2007), Sandton, South Africa, 14-16 May, pp. 205-216, 2007 More details
Considering the Usability of End-User Security Software Furnell SM, Jusoh A, Katsabas D, Haskell-Dowland PS (Dowland PS) Proceedings of 21st IFIP International Information Security Conference (IFIP SEC 2006), Karlstad, Sweden, 22-24 May, pp307-316, 2006 More details
Using Human Computer Interaction principles to promote usable security Katsabas D, Furnell SM, Haskell-Dowland PS (Dowland PS) Proceedings of Fifth International Network Conference (INC 2005), July 5-7, Samos, Greece, pp235-242, 2005 More details
Identifying the security requirements for virtual university environments Ruiz VC, Furnell SM, Phippen AD, Haskell-Dowland PS (Dowland PS), Stengel I, Bleimann U Proceedings of the Fourth Security Conference 2005, Las Vegas, USA, 30-31 March, 2005 More details
Survey of Wireless Access Point Security Voisin M, Ghita BV, Haskell-Dowland PS (Dowland PS) Proceedings of the Fourth Security Conference 2005, Las Vegas, USA, 30-31 March, 2005 More details
PassImages : an alternative method of user authentication Charruau D, Furnell SM, Haskell-Dowland PS (Dowland PS) Proceedings of the ISOneWorld 2005, Las Vegas, USA, 30 March - 1 April, 2005 More details
A Long-term Trial of Keystroke Profiling using Digraph, Trigraph and Keyword Latencies Haskell-Dowland PS (Dowland PS), Furnell SM Proceedings of IFIP/SEC 2004 - 19th International Conference on Information Security, Toulouse, France, 23-26 August, pp275-289, 2004 More details
A Correlation Framework for Continuous User Authentication Using Data Mining Singh H, Furnell SM, Haskell-Dowland PS (Dowland PS), Lines BL, Kaur S Proceedings of the Fourth International Network Conference (INC 2004), Plymouth, UK, 6-9 July 2004, pp237-245, 2004 More details
Improving Security Awareness And Training Through Computer-Based Training Furnell SM, Warren A, Haskell-Dowland PS (Dowland PS) Proceedings of the WISE Conference, Monterey, USA, July, pp287-301, 2003 More details
Assessing IT Security Culture: System Administrator and End-User Finch J, Furnell SM, Haskell-Dowland PS (Dowland PS) Proceedings of ISOneWorld Conference 2003, Las Vegas, USA, April 23-25, CD Only, 2003 More details
Critical awareness ? The problem of monitoring security vulnerabilities Furnell SM, Alayed A, Barlow I, Haskell-Dowland PS (Dowland PS) Proceedings of European Conference on Information Warfare and Security, 8-9 July 2002, Brunel, UK, pp85-92, 2002 More details
Keystroke Analysis as a Method of Advanced User Authentication and
Response Haskell-Dowland PS (Dowland PS), Furnell SM, Papadaki M Proceedings of IFIP/SEC 2002 - 17th International Conference on Information
Security, Cairo, Egypt, 7-9 May, pp215-226, 2002 More details
A Preliminary Investigation of User Authentication Using Continuous Keystroke Analysis Haskell-Dowland PS (Dowland PS), Singh H, Furnell SM Proceedings of the IFIP 8th Annual Working Conference on Information Security Management & Small Systems Security, Las Vegas, 27-28 September, 2001 More details
Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining Singh H, Furnell SM, Lines BL, Haskell-Dowland PS (Dowland PS) Proceedings of International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security, St. Petersburg, Russia, 21-23 May, 2001 More details
A Generic Taxonomy for Intrusion Specification and Response Furnell SM, Magklaras GB, Papadaki M, Haskell-Dowland PS (Dowland PS) Proceedings of Euromedia 2001, Valencia, Spain, 18-20 April, 2001 More details
Promoting security awareness and training within small organisations Furnell SM, Gennatou M, Haskell-Dowland PS (Dowland PS) Proceedings of the First Australian Information Security Management (AISM) Workshop, Geelong, Australia, 7 November, 2000 More details
A conceptual intrusion monitoring architecture and thoughts on practical implementation Haskell-Dowland PS (Dowland PS), Furnell SM Proceedings of the World Computer Congress 2000, 21-25 August, 2000 More details
Enhancing Operating System Authentication Techniques Haskell-Dowland PS (Dowland PS), Furnell SM Proceedings of the Second International Network Conference (INC 2000), Plymouth, UK, pp253-261, 3-6 July, 2000 More details
Developing tools to support online distance learning Furnell SM, Evans MP, Haskell-Dowland PS (Dowland PS) Proceedings of EUROMEDIA 2000, Antwerp, Belgium, 8-10 May, 2000 More details
64 Conference papers
Books
E-mail Security: A Pocket Guide Furnell SM, Haskell-Dowland PS (Dowland PS) IT Governance Publishing, ISBN: 978-1849280969, pp108, 2010 More details | External link available
1 Books
Edited books
Cybersecurity Teaching in Higher Education Sikos L, Haskell-Dowland PS (Dowland PS) Springer, pp139, ISBN: 978-3-031-24216-8, 2023 More details | External link available
Cybersecurity for Smart Cities Ahmed M, Haskell-Dowland PS (Dowland PS) Springer, ISBN: 978-3-031-24945-7, 2023 More details | External link available
Next-Generation Enterprise Security and Governance Ahmed M, Moustafa N, Barkat A, Haskell-Dowland PS (Dowland PS) Routledge, pp288, ISBN 9780367639624, 2022 More details | External link available
Proceedings of the Seventh Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2011) Haskell-Dowland PS (Dowland PS), Grout VM, Humm B, Knahl MH Plymouth University, ISBN: 978-1-84102-295-6, pp117, 2011 Purchase copy at Lulu.com (Print On Demand) More details | External link available
Proceedings of the Fifth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2009) Bleimann U, Haskell-Dowland PS (Dowland PS), Furnell SM, Grout VM University of Plymouth, ISBN: 978-1-84102-236-9, 223pp, 2009 Purchase copy at Lulu.com (Print On Demand) More details | External link available
Proceedings of the 11th IFIP TC 11.1 Working Conference on Information Security Management Haskell-Dowland PS (Dowland PS), Furnell SM Richmond, Virginia on 16-17 October, ISBN: 978-3-901882-31-9, pp127, 2008 Purchase copy at Lulu.com (Print On Demand) More details
Proceedings of the Fourth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2008) Bleimann U, Haskell-Dowland PS (Dowland PS), Furnell SM, Grout VM University of Plymouth, ISBN: 978-1-84102-196-6, 215pp, 2008 Purchase copy at Lulu.com (Print On Demand) More details
Proceedings of the Third Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2007) Bleimann U, Haskell-Dowland PS (Dowland PS), Furnell SM University of Plymouth, ISBN: 978-1-8410-2173-7, 273pp, 2007 Purchase copy at Lulu.com (Print On Demand) More details
Security Management, Integrity, and Internal Control in Information Systems Haskell-Dowland PS (Dowland PS), Furnell SM, Thuraisingham B, Wang XS Springer, ISBN 0-387-29826-6. 373pp, 2005 More details
Information Security and Privacy – Challenges and Outlook Furnell SM, Haskell-Dowland PS (Dowland PS), et al. (multiple authors) Advancing Research in Information and Communication Technology, pp 383-401, ISBN: 978-3-030-81700-8, 2021 More details | External link available
User Authentication Technologies Clarke NL, Haskell-Dowland PS (Dowland PS), Furnell SM in Securing Information and Communications Systems: Principles, Technologies, and Applications. S.M.Furnell, S.K.Katsikas, J.Lopez and A.Patel (Eds), Artech House, ISBN 978-1-59693-228-9, pp35-59, 2008 Available on-line. More details
Security Concepts, Services, and Threats Haskell-Dowland PS (Dowland PS), Furnell SM in Securing Information and Communications Systems: Principles, Technologies, and Applications. S.M.Furnell, S.K.Katsikas, J.Lopez and A.Patel (Eds), Artech House, ISBN 978-1-59693-228-9, pp5-20, 2008 Available on-line. More details
3 Contributions to edited books
Posters
3D Facial Recognition and Eye Tracking Ketab S, Clarke NL, Haskell-Dowland PS (Dowland PS) The Postgraduate Society Conference, 16th March 2016, Plymouth University, 2016 More details
E-invigilation of E-Assessments Ketab S, Clarke NL, Haskell-Dowland PS (Dowland PS) The Postgraduate Society Conference, 19th March, Plymouth University, 2014 More details
Enhancing Intrusion Response in Networked System Papadaki M, Furnell SM, Haskell-Dowland PS (Dowland PS), Lines BL, Reynolds PL Poster presentation at Britain's Younger Engineers in 2002, House of Commons, London, 9 December, 2002 More details
Non-Intrusive Subscriber Authentication for 3G Mopbile System Clarke NL, Haskell-Dowland PS (Dowland PS), Furnell SM, Reynolds PL, Rodwell PM Poster presentation at Britain's Younger Engineers in 2001, House of Commons, London, 3 December, 2001 More details
Advanced Authentication and Intrusion Detection Technologies Haskell-Dowland PS (Dowland PS), Furnell SM, Magklaras GB, Papadaki M, Reynolds PL, Rodwell PM, Singh H Poster presentation at Britain's Younger Engineers in 2000, House of Commons, London, 4 December, 2000 More details
5 Posters
Internal publications
Firewall Rulebase Analysis Tool Jain P, Haskell-Dowland PS (Dowland PS) Advances in Communications, Computing, Networks and Security Volume 10, ISBN: 978-1-84102-358-8, pp96-103, 2013 Can be ordered on-line. More details
Evaluation of Current E-Safety Software Latif Z, Haskell-Dowland PS (Dowland PS) Advances in Communications, Computing, Networks and Security Volume 8, ISBN: 978-1-84102-293-2, pp76-87, 2011 Can be ordered on-line. More details
Operational Business Intelligence – A Key to Just-in-Time Decision Making (JDM) Saeed B, Knahl MH, Frey-Luxemburger M, Haskell-Dowland PS (Dowland PS) Proceedings of the Seventh Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2011), Furtwangen, Germany, ISBN: 978-1-84102-295-6, pp77-87, 2011 Can be ordered on-line. More details | External link available
System Design for Embedded Automotive Systems Vergata S, Wietzke J, Schütte A, Haskell-Dowland PS (Dowland PS) Proceedings of the Sixth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2010), Plymouth, UK, ISBN: 978-1-84102-269-7, pp53-60, 2010 Can be ordered on-line. More details
An Approach for Structuring Heterogeneous Automotive Software Systems by use of Multicore Architectures Knirsch A, Wietzke J, Moore R, Haskell-Dowland PS (Dowland PS) Proceedings of the Sixth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2010), Plymouth, UK, ISBN: 978-1-84102-269-7, pp19-30, 2010 Can be ordered on-line. More details
Web-Based Plankton Data Visualisation Ho TT, Haskell-Dowland PS (Dowland PS) Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp285-293, 2009 Can be ordered on-line. More details
Implementation of the Least Privilege Principle on Windows XP, Windows Vista and Linux Scalbert L, Haskell-Dowland PS (Dowland PS) Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp226-233, 2009 Can be ordered on-line. More details
An Assessment of People's Vulnerabilities in Relation to Personal and Sensitive Data Sanders B, Haskell-Dowland PS (Dowland PS) Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp124-134, 2009 Can be ordered on-line. More details
CentOS Linux 5.2 and Apache 2.2 vs. Microsoft Windows Web Server 2008 and IIS 7.0 when Serving Static and PHP Content Moore DJ, Haskell-Dowland PS (Dowland PS) Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp92-97, 2009 Can be ordered on-line. More details
Network Security, Guidelines to Build a Security Perimeter for SMEs Godon S, Haskell-Dowland PS (Dowland PS) Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp40-47, 2009 Can be ordered on-line. More details
A SOA Middleware for High-Performance Communication Swientek M, Humm B, Bleimann U, Haskell-Dowland PS (Dowland PS) Proceedings of the Fifth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2009), Darmstadt, Germany, ISBN: 978-1-84102-236-9, pp123-133, 2009 Can be ordered on-line. More details
Online Gaming: An Emerging Avenue for Exploitation? Sanders B, Haskell-Dowland PS (Dowland PS), Furnell SM Proceedings of the Fifth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2009), Darmstadt, Germany, ISBN: 978-1-84102-236-9, pp29-42, 2009 Can be ordered on-line. More details
Investigating Options of Securing Web Application Meemeskul T, Haskell-Dowland PS (Dowland PS) Advances in Communications, Computing, Networks and Security 5, ISBN: 978-1-84102-257-4, pp267-273, 2008 Can be ordered on-line. More details
Investigating, Implementing and Evaluating Client-Side Keystroke Analysis User Authentication for Web Sites Hocking C, Haskell-Dowland PS (Dowland PS) Advances in Communications, Computing, Networks and Security 5, ISBN: 978-1-84102-257-4, pp126-134, 2008 Can be ordered on-line. More details
Implementing a Visual Network Management Console Agbai OC, Haskell-Dowland PS (Dowland PS) Advances in Communications, Computing, Networks and Security 5, ISBN: 978-1-84102-257-4, pp89-98, 2008 Can be ordered on-line. More details
A Survey of User Opinions and Preference Towards Graphical Authentication Jali MZ, Furnell SM, Haskell-Dowland PS (Dowland PS), Reid F Proceedings of the Fourth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2008), Wrexham, UK, ISBN: 978-1-84102-196-6, pp11-20, 2008 Can be ordered on-line. More details
Web-based Plankton Data Visualisation Aung TY, Haskell-Dowland PS (Dowland PS) Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp173-181, 2007 Can be ordered on-line. More details
Information Security Awareness & Training Al-Ghatam H, Haskell-Dowland PS (Dowland PS) Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp157-163, 2007 Can be ordered on-line. More details
A guide for small and medium enterprise of implementing security and firewall system Zhang R, Haskell-Dowland PS (Dowland PS) Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp146-153, 2007 Can be ordered on-line. More details
VoIP Security Threats and Vulnerabilities Rizvi SMA, Haskell-Dowland PS (Dowland PS) Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp114-122, 2007 Can be ordered on-line. More details
The Art of Network Monitoring Mohyuddin A, Haskell-Dowland PS (Dowland PS) Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp100-105, 2007 Can be ordered on-line. More details
Implementing Network Monitoring Tools Asiwe VC, Haskell-Dowland PS (Dowland PS) Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp3-10, 2007 Can be ordered on-line. More details
Social Engineering: A growing threat, with diverging directions Chelleth JV, Furnell SM, Papadaki M, Pinkney G, Haskell-Dowland PS (Dowland PS) Advances in Network & Communication Engineering 3, pp179-184, 2006 Can be ordered on-line. More details
Security and Risk Analysis of VoIP Networks Feroz S, Haskell-Dowland PS (Dowland PS) Advances in Network & Communication Engineering 3, pp83-89, 2006 Can be ordered on-line. More details
Implementing a network operations centre management console: Netmates Bali R, Haskell-Dowland PS (Dowland PS) Advances in Network & Communication Engineering 3, pp75-82, 2006 Can be ordered on-line. More details
Design of an Architecture for Wireless Community Networks Perry A, Haskell-Dowland PS (Dowland PS) Advances in Network & Communication Engineering 2, pp93-101, 2005 More details
Approaches to Establishing IT Security Culture Langue C, Furnell SM, Haskell-Dowland PS (Dowland PS) Advances in Network & Communication Engineering 2, pp43-48, 2005 More details
Passimages : An Alternative Method of User Authentication Charruau D, Furnell SM, Haskell-Dowland PS (Dowland PS) Advances in Network & Communication Engineering 2, pp3-10, 2005 More details
Security Analysis Tools - Do They Make Any Difference? Bolakis S, Furnell SM, Haskell-Dowland PS (Dowland PS) Advances in Network & Communication Engineering, pp29-37, 2004 More details
29 Internal publications
Other publications
Iran’s internet blackout left people in the dark. How does a country shut down the internet? Ahmed M, Haskell-Dowland PS (Dowland PS) The Conversation, 24 June, 2025 More details | External link available
What’s the difference between passwords and passkeys? It’s not just the protection they provide Haskell-Dowland PS (Dowland PS), Vasileiou I The Conversation, 24 October, 2025 More details | External link available
Data centres are guzzling up too much electricity. Can we make them more efficient? Haskell-Dowland PS (Dowland PS), Ghita BV The Conversation, 29 July, 2024 More details | External link available
We still don’t know the extent of the MediSecure breach, but watch out for these potential scams Haskell-Dowland PS (Dowland PS) The Conversation, 21 May, 2024 More details | External link available
Australia will trial ‘age assurance’ tech to bar children from online porn. What is it and will it work? Haskell-Dowland PS (Dowland PS) The Conversation, 2 May, 2024 More details | External link available
How risky is it to give card details over the phone and how do I reduce the chance of fraud? Haskell-Dowland PS (Dowland PS), Vasileiou I The Conversation, 23 November, 2023 More details | External link available
What is LockBit, the cybercrime gang hacking some of the world’s largest organisations? Medbury J, Haskell-Dowland PS (Dowland PS) The Conversation, 17 November, 2023 More details | External link available
Has the cyberattack on DP World put Australia’s trade at risk? Probably not … this time Macau F, Haskell-Dowland PS (Dowland PS) The Conversation, 13 November, 2023 More details | External link available
Optus blackout explained: what is a ‘deep network’ outage and what may have caused it? Haskell-Dowland PS (Dowland PS), Gregory MA, Ahmed M The Conversation, 8 November, 2023 More details | External link available
Most data lives in the cloud. What if it lived under the sea? Haskell-Dowland PS (Dowland PS), McMahon K The Conversation, 27 October, 2023 More details | External link available
Meta just copped a A$1.9bn fine for keeping EU data in the US. But why should users care where data are stored? Haskell-Dowland PS (Dowland PS) The Conversation, 24 May, 2023 More details | External link available
A cancer centre is the latest victim of cyber attacks. Why health data hacks keep happening Ahmed M, Haskell-Dowland PS (Dowland PS) The Conversation, 8 May, 2023 More details | External link available
Google and Microsoft are bringing AI to Word, Excel, Gmail and more. It could boost productivity for us – and cybercriminals Ahmed M, Haskell-Dowland PS (Dowland PS) The Conversation, 21st March, 2023 More details | External link available
Big Tech is firing employees by the thousands. Why? And how worried should we be? Collins N, Volkheimer J, Haskell-Dowland PS (Dowland PS) The Conversation, 25th January, 2023 More details | External link available
Why Alexa is not your friend Collins N, Volkheimer J, Haskell-Dowland PS (Dowland PS) Information Age, 11 January, 2023 More details | External link available
Medibank won’t pay hackers ransom. Is it the right choice? Ahmed M, Haskell-Dowland PS (Dowland PS) The Conversation, 8th November, 2022 More details | External link available
Apple’s PassKeys update could make traditional passwords obsolete Haskell-Dowland PS (Dowland PS), Furnell SM The Conversation, 12th September, 2022 More details | External link available
iRobot’s Roomba will soon be owned by Amazon, which raises privacy questions Haskell-Dowland PS (Dowland PS) The Conversation, 9th August, 2022 More details | External link available
Today’s Google outage was brief but disconcerting Haskell-Dowland PS (Dowland PS) The Conversation, 9th August, 2022 More details | External link available
Amazon just took over a primary healthcare company for a lot of money. Should we be worried? Ahmed M, Haskell-Dowland PS (Dowland PS) The Conversation, 27th July, 2022 More details | External link available
5 big trends in Australians getting scammed Haskell-Dowland PS (Dowland PS) The Conversation, 7th July, 2022 More details | External link available
The iPhone turns 15: a look at the past (and future) of one of the 21st century’s most influential devices Vasileiou I, Haskell-Dowland PS (Dowland PS) The Conversation, 29th June, 2022 More details | External link available
Goodbye Internet Explorer. You won’t be missed (but your legacy will be remembered) Ahmed M, Malik I, Haskell-Dowland PS (Dowland PS) The Conversation, 16th June, 2022 More details | External link available
Budget 2022: $9.9 billion towards cyber security aims to make Australia a key ‘offensive’ cyber player Haskell-Dowland PS (Dowland PS) The Conversation, 30th March, 2022 More details | External link available
Is Russia really about to cut itself off from the internet? And what can we expect if it does? Ahmed M, Haskell-Dowland PS (Dowland PS) The Conversation, 10th March, 2022 More details | External link available
The hacker group Anonymous has waged a cyber war against Russia. How effective could they actually be? Medbury J, Haskell-Dowland PS (Dowland PS) The Conversation, 1st March, 2022 More details | External link available
As Russia wages cyber war against Ukraine, here’s how Australia (and the rest of the world) could suffer collateral damage Haskell-Dowland PS (Dowland PS) The Conversation, 25th February, 2022 More details | External link available
This New Year, why not resolve to ditch your dodgy old passwords? Haskell-Dowland PS (Dowland PS), Cranor L The Conversation, 3rd January, 2022 More details | External link available
500,000 or 20,000? How to estimate the size of a political rally properly Abu-Khalaf J, Haskell-Dowland PS (Dowland PS) The Conversation, 1st December, 2021 More details | External link available
Facebook wants AI to find your keys and understand your conversations Abu-Khalaf J, Haskell-Dowland PS (Dowland PS) The Conversation, 21st October, 2021 More details | External link available
Being bombarded with delivery and post office text scams? Here’s why — and what can be done Vasileiou I, Haskell-Dowland PS (Dowland PS) The Conversation, 22nd September, 2021 More details | External link available
‘What is my IP address?’ Explaining one of the world’s most Googled questions Haskell-Dowland PS (Dowland PS), Ghita BV The Conversation, 15th September, 2021 More details | External link available
Is Google getting worse? Increased advertising and algorithm changes may make it harder to find what you’re looking for Ahmed M, Haskell-Dowland PS (Dowland PS) The Conversation, 1st September, 2021 More details | External link available
How does the Pegasus spyware work, and is my phone at risk? Haskell-Dowland PS (Dowland PS), Musotto R The Conversation, 21st July, 2021 More details | External link available
Is Australia a sitting duck for ransomware attacks? Yes, and the danger has been growing for 30 years Haskell-Dowland PS (Dowland PS), Woodward A The Conversation, 14th July, 2021 More details | External link available
Holding the world to ransom: the top 5 most dangerous criminal organisations online right now Musotto R, O'Shea B, Haskell-Dowland PS (Dowland PS) The Conversation, 7th July, 2021 More details | External link available
Cyber Cold War? The US and Russia talk tough, but only diplomacy will ease the threat Ibrahim A, Haskell-Dowland PS (Dowland PS) The Conversation, 25th June, 2021 More details | External link available
‘We have filed a case under your name’: beware of tax scams — they’ll be everywhere this EOFY Haskell-Dowland PS (Dowland PS), Collins N The Conversation, 18 June, 2021 More details | External link available
How rain, wind, heat and other heavy weather can affect your internet connection Kang J, Haskell-Dowland PS (Dowland PS) The Conversation, 10 June, 2021 More details | External link available
Fastly global internet outage: why did so many sites go down — and what is a CDN, anyway? Haskell-Dowland PS (Dowland PS) The Conversation, 8 June, 2021 More details | External link available
What is ‘Other’ in my iPhone storage, why is it taking up so much space and how do I clear it? Haskell-Dowland PS (Dowland PS), Szewczyk P The Conversation, 26 May, 2021 More details | External link available
Remember, Apple AirTags and ‘Find My’ app only work because of a vast, largely covert tracking network Haskell-Dowland PS (Dowland PS) The Conversation, 17 May, 2021 More details | External link available
Apple’s new ‘app tracking transparency’ has angered Facebook. How does it work, what’s all the fuss about, and should you use it? Haskell-Dowland PS (Dowland PS), Hampton N The Conversation, 28 April, 2021 More details | External link available
Facebook data breach: what happened and why it’s hard to know if your data was leaked Haskell-Dowland PS (Dowland PS) The Conversation, 6 April, 2021 More details | External link available
Holding the news to ransom? What we know so far about the Channel 9 cyber attack Haskell-Dowland PS (Dowland PS) The Conversation, 30th March, 2021 More details | External link available
How to encourage cyber-safe behaviour at work without becoming the office grouch Collins N, Volkheimer J, Haskell-Dowland PS (Dowland PS) The Conversation, 26 February, 2021 More details | External link available
The Christmas gifts that keep giving (your data away) — and how to prevent this Haskell-Dowland PS (Dowland PS), Furnell SM The Conversation, 5th January, 2021 More details | External link available
Australian hospitals are under constant cyber attack. The consequences could be deadly Haskell-Dowland PS (Dowland PS) The Conversation, 18th November, 2020 More details | External link available
Robot take the wheel: Waymo has launched a self-driving taxi service Kang J, Ahmed M, Haskell-Dowland PS (Dowland PS) The Conversation, 15th October, 2020 More details | External link available
Airports, ATMs, hospitals: Microsoft Windows XP leak would be less of an issue, if so many didn’t use it O'Shea B, Haskell-Dowland PS (Dowland PS) The Conversation, 30th September, 2020 More details | External link available
Trump’s TikTok deal explained: who is Oracle? Why Walmart? And what does it mean for our data? Haskell-Dowland PS (Dowland PS), Collins N The Conversation, 22nd September, 2020 More details | External link available
A computer can guess more than 100,000,000,000 passwords per second. Still think yours is secure? Haskell-Dowland PS (Dowland PS), O'Shea B The Conversation, 15th September, 2020 More details | External link available
Face masks and facial recognition will both be common in the future. How will they co-exist? Haskell-Dowland PS (Dowland PS) The Conversation, 7th September, 2020 More details | External link available
Microsoft's takeover would be a win for TikTok and tech giants – not users Haskell-Dowland PS (Dowland PS), O'Shea B The Conversation, 3rd August, 2020 More details | External link available
China could be using TikTok to spy on Australians, but banning it isn’t a simple fix Haskell-Dowland PS (Dowland PS), Kang J The Conversation, 8 July, 2020 More details | External link available
How safe is COVIDSafe? What you should know about the app's issues, and Bluetooth-related risks Kang J, Haskell-Dowland PS (Dowland PS) The Conversation, 7 May, 2020 More details | External link available
ANU will invigilate exams using remote software, and many students are unhappy Haskell-Dowland PS (Dowland PS) The Conversation, 24 April, 2020 More details | External link available
Cyber threats at home: how to keep kids safe while they’re learning online Haskell-Dowland PS (Dowland PS), Vasileiou I The Conversation, 24 April, 2020 More details | External link available
Crashing the party: beware the cyber risks of virtual meet-up apps like Houseparty Ahmed M, Haskell-Dowland PS (Dowland PS) The Conversation, 15 April, 2020 More details | External link available
How to boost your internet speed when everyone is working from home Kang J, Haskell-Dowland PS (Dowland PS) The Conversation, 2 April, 2020 More details | External link available
Restricting underage access to porn and gambling sites: a good idea, but technically tricky Haskell-Dowland PS (Dowland PS) The Conversation, 10 March, 2020 More details | External link available
Don't die wondering: apps may soon be able to predict your life expectancy, but do you want to know? Kang J, Haskell-Dowland PS (Dowland PS) The Conversation, 16 January, 2020 More details | External link available
Aerial threat: why drone hacking could be bad news for the military Ahmed M, Haskell-Dowland PS (Dowland PS) The Conversation, 8 October, 2019 More details | External link available
PayID data breaches show Australia’s banks need to be more vigilant to hacking Haskell-Dowland PS (Dowland PS) The Conversation, 18 September, 2019 More details | External link available
Apple iPhones could have been hacked for years – here’s what to do about it Sikos L, Haskell-Dowland PS (Dowland PS) The Conversation, 5 September, 2019 More details | External link available
Three ways the "NotPetya" cyberattack is more complex than WannaCry Haskell-Dowland PS (Dowland PS) The Conversation, 30th June, 2017 More details | External link available
Using student analytics to improve the student experience and underpin success at university Haskell-Dowland PS (Dowland PS) Professionals in International Education, June 27, 2014 More details | External link available
Adapting to analytics Haskell-Dowland PS (Dowland PS) Education Technology & Wildfire Comms, 2 June 2014, 2014 More details | External link available
Collecting data on students: is it useful to know which books they've read? Haskell-Dowland PS (Dowland PS) The Guardian Higher Education Network , 29 April 2014, 2014 More details | External link available
What’s the difference between passwords and passkeys? It’s not just the protection they providePaul Haskell-Dowland, Edith Cowan University and Ismini Vasileiou, De Montfort University, October 24, 2025Passkeys are stronger than passwords by design. But they have other benefits too. View on website
Iran’s internet blackout left people in the dark. How does a country shut down the internet?Mohiuddin Ahmed, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University, June 24, 2025If a government wants to shut down the internet, it really can – the technical capability is there. View on website
Data centres are guzzling up too much electricity. Can we make them more efficient?Paul Haskell-Dowland, Edith Cowan University and Bogdan Ghita, University of Plymouth, July 29, 2024Between AI and bingeing TV shows, we’re using more data than ever – and data centres are power hungry. Thankfully, there are some ways to optimise their power usage. View on website
We still don’t know the extent of the MediSecure breach, but watch out for these potential scamsPaul Haskell-Dowland, Edith Cowan University, May 21, 2024A data breach has affected the digital prescription company MediSecure. While investigations continue, cyber criminals will likely use this event for new scam campaigns. View on website
Australia will trial ‘age assurance’ tech to bar children from online porn. What is it and will it work?Paul Haskell-Dowland, Edith Cowan University, May 2, 2024The Australian government will test tools to shield kids from inappropriate material online. Even though there’s no one easy fix, these checks could help. View on website
How risky is it to give card details over the phone and how do I reduce the chance of fraud?Paul Haskell-Dowland, Edith Cowan University and Ismini Vasileiou, De Montfort University, November 23, 2023It’s legal for a merchant to get your card details over the phone – but it can still be risky. Here’s what you need to know to stay safe. View on website
What is LockBit, the cybercrime gang hacking some of the world’s largest organisations?Jennifer Medbury, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University, November 17, 2023Prolific and highly profitable, LockBit provides ransomware as a service. Aspiring cybercriminals sign up to the scheme, and the group takes a cut. Here’s how it works. View on website
Has the cyberattack on DP World put Australia’s trade at risk? Probably not … this timeFlavio Macau, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University, November 13, 2023A cyberattack on one of Australia’s biggest port operators has highlighted the potential vulnerability of the global economy. View on website
Optus blackout explained: what is a ‘deep network’ outage and what may have caused it?Paul Haskell-Dowland, Edith Cowan University; Mark A Gregory, RMIT University, and Mohiuddin Ahmed, Edith Cowan University, November 8, 2023Optus suffered one of the largest telecommunications outages in Australian history today. Here are the factors that can cause such events. View on website
Most data lives in the cloud. What if it lived under the sea?Paul Haskell-Dowland, Edith Cowan University and Kathryn McMahon, Edith Cowan University, October 27, 2023Could the data centres that power the internet be moved to the bottom of the ocean? It’s not as crazy as it sounds View on website
Meta just copped a A$1.9bn fine for keeping EU data in the US. But why should users care where data are stored?Paul Haskell-Dowland, Edith Cowan University, May 24, 2023Meta now faces some A$4 billion in fines related to breaches of the European Union’s General Data Protection Regulations. View on website
A cancer centre is the latest victim of cyber attacks. Why health data hacks keep happeningMohiuddin Ahmed, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University, May 8, 2023While some cyber criminals have previously avoided schools and health-care organisations, it seems these are now fair game. View on website
Google and Microsoft are bringing AI to Word, Excel, Gmail and more. It could boost productivity for us – and cybercriminalsMohiuddin Ahmed, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University, March 21, 2023The new tools are expected to free up space for workers by helping out with tedious and repetitive task. Here’s how it will work. View on website
Big Tech is firing employees by the thousands. Why? And how worried should we be?Nathalie Collins, Edith Cowan University; Jeff Volkheimer, Duke University, and Paul Haskell-Dowland, Edith Cowan University , January 25, 2023The numbers are less concerning when viewed in the bigger picture. View on website
Medibank won’t pay hackers ransom. Is it the right choice?Mohiuddin Ahmed, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University, November 8, 2022A well-known cybercrime group has threatened to release the data should the ransom not be paid. View on website
Apple’s PassKeys update could make traditional passwords obsoletePaul Haskell-Dowland, Edith Cowan University and Steven Furnell, University of Nottingham, September 12, 2022The advice for years has been to use password managers. But even these don’t completely eliminate the risk of being compromised. View on website
iRobot’s Roomba will soon be owned by Amazon, which raises privacy questionsPaul Haskell-Dowland, Edith Cowan University, August 9, 2022In the development of ever smarter homes, Amazon could soon have access to the maps of our houses created and stored by Roomba vacuums. View on website
Today’s Google outage was brief but disconcertingPaul Haskell-Dowland, Edith Cowan University, August 9, 2022Google’s brief disappearance from the internet felt, for many, like an almost-apocalyptic moment View on website
Amazon just took over a primary healthcare company for a lot of money. Should we be worried?Mohiuddin Ahmed, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University, July 27, 2022One Medical provides primary healthcare services to people across the US. View on website
5 big trends in Australians getting scammedPaul Haskell-Dowland, Edith Cowan University, July 7, 2022Scam techniques that rely on human nature are increasingly being executed via technology. Here are five that recorded big increases in 2021. View on website
The iPhone turns 15: a look at the past (and future) of one of the 21st century’s most influential devicesIsmini Vasileiou, De Montfort University and Paul Haskell-Dowland, Edith Cowan University , June 29, 2022Despite its ‘innovator’ status, Apple usually wasn’t the first one to offer groundbreaking new features. But it knew how to adopt existing features in groundbreaking ways. View on website
Goodbye Internet Explorer. You won’t be missed (but your legacy will be remembered)Mohiuddin Ahmed, Edith Cowan University; M Imran Malik, Edith Cowan University, and Paul Haskell-Dowland, Edith Cowan University, June 16, 2022Explorer came at the dawn of the public internet. For millions of people, it will always be their first experience of the World Wide Web. View on website
Budget 2022: $9.9 billion towards cyber security aims to make Australia a key ‘offensive’ cyber playerPaul Haskell-Dowland, Edith Cowan University, March 30, 2022The funds are allocated across a ten-year period, with most of the money redirected from defence spending. View on website
Is Russia really about to cut itself off from the internet? And what can we expect if it does?Mohiuddin Ahmed, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University, March 10, 2022The Kremlin is pushing for a quick migration of all Russian websites and services to be hosted within the country. It could be the first stage of a larger disconnection. View on website
The hacker group Anonymous has waged a cyber war against Russia. How effective could they actually be?Jennifer Medbury, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University, March 1, 2022There’s an alleged global network of cyber activists operating under the Anonymous name. Knowing who is responsible for what will become increasingly difficult as more cyber attacks happen. View on website
As Russia wages cyber war against Ukraine, here’s how Australia (and the rest of the world) could suffer collateral damagePaul Haskell-Dowland, Edith Cowan University, February 25, 2022These days sophisticated malware can spread like wildfire, thanks to transnational businesses and organisations providing bridges across countries. View on website
This New Year, why not resolve to ditch your dodgy old passwords?Paul Haskell-Dowland, Edith Cowan University and Lorrie Cranor, Carnegie Mellon University, January 3, 2022Start 2022 by improving your password hygiene. Ideally you can use a password manager, but at the very least make sure your financial, social and work accounts each has their own strong, unique login. View on website
500,000 or 20,000? How to estimate the size of a political rally properlyJumana Abu-Khalaf, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University, December 1, 2021Image recognition algorithms, military satellites, and mobile data networks can all help estimate crowd sizes. But the underlying maths still comes down to a basic formula: density multiplied by area. View on website
Facebook wants AI to find your keys and understand your conversationsJumana Abu-Khalaf, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University, October 21, 2021Facebook’s Ego4D project will help computers see the world from your point of view - for better or worse. View on website
Being bombarded with delivery and post office text scams? Here’s why — and what can be doneIsmini Vasileiou, De Montfort University and Paul Haskell-Dowland, Edith Cowan University, September 22, 2021Australians are being bombarded with ‘missed parcel’ SMS messages that aren’t as they seem… View on website
‘What is my IP address?’ Explaining one of the world’s most Googled questionsPaul Haskell-Dowland, Edith Cowan University and Bogdan Ghita, University of Plymouth, September 15, 2021IP addresses serve a similar function to postal addresses. Postal addresses allow our mail to circulate, while IP addresses allow network traffic to move around the internet. View on website
Is Google getting worse? Increased advertising and algorithm changes may make it harder to find what you’re looking forMohiuddin Ahmed, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University, September 1, 2021More advertising and “smarter” search algorithms are changing how Googling works. View on website
How does the Pegasus spyware work, and is my phone at risk?Paul Haskell-Dowland, Edith Cowan University and Roberto Musotto, Edith Cowan University, July 21, 2021It's reported the Pegasus spyware can capture a user's keystrokes, intercept communications, track their device and tap into their camera and microphone. View on website
Is Australia a sitting duck for ransomware attacks? Yes, and the danger has been growing for 30 yearsPaul Haskell-Dowland, Edith Cowan University and Andrew Woodward, Edith Cowan University, July 14, 2021The first ransomware attack, in 1988, was a crude effort involving virus-laden floppy disks. But in the decades since, the sophistication of malware, and the money reaped by criminals, has skyrocketed. View on website
Holding the world to ransom: the top 5 most dangerous criminal organisations online right nowRoberto Musotto, Edith Cowan University; Brianna O'Shea, Edith Cowan University, and Paul Haskell-Dowland, Edith Cowan University, July 7, 2021The recent attack on software supplier Kaseya has been labelled as the biggest global ransomware attack on record. View on website
Cyber Cold War? The US and Russia talk tough, but only diplomacy will ease the threatAhmed Ibrahim, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University, June 25, 2021At this month's summit, US President Joe Biden warned his counterpart Vladimir Putin of reprisals against 'persistent malicious cyber-attacks'. But it will take more than posturing to end the stand-off. View on website
‘We have filed a case under your name’: beware of tax scams — they’ll be everywhere this EOFYPaul Haskell-Dowland, Edith Cowan University and Nathalie Collins, Edith Cowan University, June 18, 2021As winter draws in, Australians don't just have to prepare for tax time — they must also be on the watch for scams. View on website
How rain, wind, heat and other heavy weather can affect your internet connectionJames Jin Kang, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University, June 10, 2021When the weather gets wild, your internet connection can suffer. But other users are as much to blame as the wind and rain View on website
Fastly global internet outage: why did so many sites go down — and what is a CDN, anyway?Paul Haskell-Dowland, Edith Cowan University, June 8, 2021To understand what happened, you need to know what a CDN (content delivery network) is, and how crucial they are to the smooth running of the internet. View on website
What is ‘Other’ in my iPhone storage, why is it taking up so much space and how do I clear it?Paul Haskell-Dowland, Edith Cowan University and Patryk Szewczyk, Edith Cowan University, May 26, 2021The most effective solution is also the most radical. View on website
Remember, Apple AirTags and ‘Find My’ app only work because of a vast, largely covert tracking networkPaul Haskell-Dowland, Edith Cowan University, May 17, 2021AirTags promise to help find your lost wallet or bag. But at worst, they could be used for stalking, and at best they involve signing up to a global tracking network most users aren't truly aware of. View on website
Apple’s new ‘app tracking transparency’ has angered Facebook. How does it work, what’s all the fuss about, and should you use it?Paul Haskell-Dowland, Edith Cowan University and Nikolai Hampton, Edith Cowan University, April 28, 2021Apple's latest iPhone operating system lets you opt out of having your online habits tracked by the apps you use. That's a big part of Facebook's business model, but don't expect a privacy revolution. View on website
Facebook data breach: what happened and why it's hard to know if your data was leakedPaul Haskell-Dowland, Edith Cowan University, April 6, 2021More than 500 million people's details were compromised. The records include various combinations of name, email, gender, date of birth, location, relationship status and employer. View on website
Holding the news to ransom? What we know so far about the Channel 9 cyber attackPaul Haskell-Dowland, Edith Cowan University, March 30, 2021It's still too early to say who attacked Channel Nine, disrupting its live broadcasts over the weekend. But fingers have been pointed at Russian state actors using a tactic nicknamed 'wiperware'. View on website
How to encourage cyber-safe behaviour at work without becoming the office grouchNathalie Collins, Edith Cowan University; Jeff Volkheimer, Duke University, and Paul Haskell-Dowland, Edith Cowan University, February 26, 2021If you're reluctant to share your password, or broadcast a team password in Slack in a groupchat, your instincts are correct. But mocking those who 'do the wrong thing' is unlikely to help. View on website
The Christmas gifts that keep giving (your data away) — and how to prevent thisPaul Haskell-Dowland, Edith Cowan University and Steven Furnell, University of Nottingham, January 5, 2021Many of us will have received new gadgets this festive season. But how can we ensure these are set up safely? And what's the best way to discard of old devices being replaced? View on website
Australian hospitals are under constant cyber attack. The consequences could be deadlyPaul Haskell-Dowland, Edith Cowan University, November 18, 2020Cyberattacks on Australian healthcare facilities are on the rise. View on website
Robot take the wheel: Waymo has launched a self-driving taxi serviceJames Jin Kang, Edith Cowan University; Mohiuddin Ahmed, Edith Cowan University, and Paul Haskell-Dowland, Edith Cowan University, October 15, 2020The age of autonomous vehicles is edging closer to reality with the launch of a driverless taxi service in the USA. View on website
Airports, ATMs, hospitals: Microsoft Windows XP leak would be less of an issue, if so many didn’t use itBrianna O'Shea, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University, September 30, 2020The outdated Microsoft operating system was recently dumped online in a huge leak. Hackers can now scour it for bugs to exploit. View on website
Trump’s TikTok deal explained: who is Oracle? Why Walmart? And what does it mean for our data?Paul Haskell-Dowland, Edith Cowan University and Nathalie Collins, Edith Cowan University, September 22, 2020Plot twists in the TikTok saga continue to emerge daily, with a proposed deal to secure its future in the US now in doubt. Here's what it means for TikTok users — and for geopolitics. View on website
A computer can guess more than 100,000,000,000 passwords per second. Still think yours is secure?Paul Haskell-Dowland, Edith Cowan University and Brianna O'Shea, Edith Cowan University, September 15, 2020One website dedicated to tracking stolen passwords suggests there are details of currently more than 10 billion compromised accounts available online. View on website
Face masks and facial recognition will both be common in the future. How will they co-exist?Paul Haskell-Dowland, Edith Cowan University, September 7, 2020With face masks now compulsory or recommended in various parts of the country, how are facial recognition systems functioning? View on website
Microsoft’s takeover would be a win for TikTok and tech giants – not usersPaul Haskell-Dowland, Edith Cowan University and Brianna O'Shea, Edith Cowan University, August 3, 2020If a new deal between Microsoft and ByteDance goes through, the Chinese company may withdraw ownership of its TikTok operations in not only the US – but also Australia, New Zealand and Canada. View on website
China could be using TikTok to spy on Australians, but banning it isn’t a simple fixPaul Haskell-Dowland, Edith Cowan University and James Jin Kang, Edith Cowan University, July 8, 2020The US is also 'looking at' banning the Chinese social media app. View on website
How safe is COVIDSafe? What you should know about the app’s issues, and Bluetooth-related risksJames Jin Kang, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University, May 7, 2020From conflicts with specialised medical devices, through to unresolved problems with iPhone functionality, COVIDSafe is in need of updates. A major one may come within the next few weeks. View on website
ANU will invigilate exams using remote software, and many students are unhappyPaul Haskell-Dowland, Edith Cowan University, April 24, 2020The Australian National University is turning to digital proctoring to replace the role of a walking invigilator. But who watches the proctor, what are the risks, and what data will be collected? View on website
Cyber threats at home: how to keep kids safe while they’re learning onlinePaul Haskell-Dowland, Edith Cowan University and Ismini Vasileiou, De Montfort University, April 24, 2020Just as office workers need to be aware of cyber risks when setting up a home office, parents need to think about the increased exposure their children will face View on website
Crashing the party: beware the cyber risks of virtual meet-up apps like HousepartyMohiuddin Ahmed, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University, April 15, 2020Apps like Houseparty and Netflix Party are helping people stay in touch with friends - but do these apps have cyber dangers that we need to be aware of? View on website
How to boost your internet speed when everyone is working from homeJames Jin Kang, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University, April 2, 2020Your mobile internet bandwidth is shared with others in your area. That's why many people trying to access the iternet at the same time results in slower speeds. View on website
Restricting underage access to porn and gambling sites: a good idea, but technically trickyPaul Haskell-Dowland, Edith Cowan University, March 10, 2020Accessing gambling and pornography sites may well get harder in Australia, if plans for mandatory age-verification go ahead. But there are already technical workarounds for determined web users. View on website
Don’t die wondering: apps may soon be able to predict your life expectancy, but do you want to know?James Jin Kang, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University, January 16, 2020Predicting life expectancy remains in the realm of science fiction, but it may soon be possible. Are we prepared for such information? And who else would benefit View on website
Aerial threat: why drone hacking could be bad news for the militaryMohiuddin Ahmed, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University, October 8, 2019Drones are now an integral part of defence force capability, from intelligence gathering to unmanned theatre engagement. But what happens if our own technology is turned against us? View on website
PayID data breaches show Australia’s banks need to be more vigilant to hackingPaul Haskell-Dowland, Edith Cowan University, September 18, 2019PayID has been misused and compromised in various ways since its 2018 launch. The system deals only in "incoming" payments, not outgoing ones – but that doesn't mean users are safe from cyber crime. View on website
Apple iPhones could have been hacked for years – here’s what to do about itLeslie Sikos, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University, September 5, 2019The news that malware can invade iPhones and other Apple devices via the Safari web browser has damaged Apple's reputation for security. But you can fix the problem by updating your phone's software. View on website
Three ways the ‘NotPetya’ cyberattack is more complex than WannaCryPaul Haskell-Dowland, Edith Cowan University, June 30, 2017Mayhem, not money, seems to be the ultimate aim of the latest attack unleashed on computer networks around the world. View on website
Randomly selected article from "The Conversation"
Face masks and facial recognition will both be common in the future. How will they co-exist?
It’s surprising how quickly public opinion can change. Winding the clocks back 12 months, many of us would have looked at a masked individual in public with suspicion.
Now, some countries have enshrined face mask use in law. They’ve also been made compulsory in Victoria and are recommended in several other states.
One consequence of this is that facial recognition systems in place for security and crime prevention may no longer be able to fulfil their purpose. In Australia, most agencies are silent about the use of facial recognition.
Facial recognition involves using computing to identify human faces in images or videos, and then measuring specific facial characteristics. This can include the distance between eyes, and the relative positions of the nose, chin and mouth.
This information is combined to create a facial signature, or profile. When used for individual recognition – such as to unlock your phone – an image from the camera is compared to a recorded profile. This process of facial “verification” is relatively simple.
However, when facial recognition is used to identify faces in a crowd, it requires a significant database of profiles against which to compare the main image.
These profiles can be legally collected by enrolling large numbers of users into systems. But they’re sometimes collected through covert means.
Facial ‘verification’ (the method used to unlock smartphones) compares the main image with a single pre-saved facial signature. Facial ‘identification’ requires examining the image against an entire database of facial signatures.teguhjatipras/pixabay
The problem with face masks
As facial signatures are based on mathematical models of the relative positions of facial features, anything that reduced the visibility of key characteristics (such as the nose, mouth and chin) interferes with facial recognition.
There are already many ways to evade or interfere with facial recognition technologies. Some of these evolved from techniques designed to evade number plate recognition systems.
Although the coronavirus pandemic has escalated concerns around the evasion of facial recognition systems, leaked US documents show these discussions taking place back in 2018 and 2019, too.
This clip shows how fashion designers are outsmarting facial recognition surveillance / YouTube.
And while the debate on the use and legality of facial recognition continues, the focus has recently shifted to the challenges presented by mask-wearing in public.
On this front, the US National Institute of Standards and Technology (NIST) coordinated a major research project to evaluate how masks impacted the performance of various facial recognition systems used across the globe.
Its report, published in July, found some algorithms struggled to correctly identify mask-wearing individuals up to 50% of the time. This was a significant error rate compared to when the same algorithms analysed unmasked faces.
There are currently no usable photo data sets of mask-wearing people that can be used to train and evaluate facial recognition systems.
The NIST study addressed this problem by superimposing masks (of various colours, sizes and positions) over images of faces, as seen here:
While this may not be a realistic portrayal of a person wearing a mask, it’s effective enough to study the effects of mask-wearing on facial recognition systems.
It’s possible images of real masked people would allow more details to be extracted to improve recognition systems – perhaps by estimating the nose’s position based on visible protrusions in the mask.
Many facial recognition technology vendors are already preparing for a future where mask use will continue, or even increase. One US company offers masks with customers’ faces printed on them, so they can unlock their smartphones without having to remove it.
Growing incentives for wearing masks
Even before the coronavirus pandemic, masks were a common defence against air pollution and viral infection in countries including China and Japan.
Facial recognition systems will need to adapt. Detection will be based on features that remain visible such as the eyes, eyebrows, hairline and general shape of the face.
Such technologies are already under development. Several suppliers are offering upgrades and solutions that claim to deliver reliable results with mask-wearing subjects.
For those who oppose the use of facial recognition and wish to go undetected, a plain mask may suffice for now. But in the future they might have to consider alternatives, such as a mask printed with a fake computer-generated face.
Organising Committee Chair and International Programme Committee Member, International Network Conference 2006, INC 2006, Plymouth, UK, 11-14 July 2006
Local Organising Committee Chair and International Programme Committee Member, International Network Conference 2004, INC 2004, Plymouth, UK, July 2004
Dr Luzuko Tekeni, External Examiner, PhD thesis, Nelson Mandela University, December 2022
Dr Liza Salleh, External Examiner, PhD thesis, University of Auckland, September 2020
Dr Timm Heuss, Internal Examiner, PhD thesis, December 2016
Dr Thomas Rübsamen, Internal Examiner, PhD thesis, November 2016
Dr Janet Kneller, Internal Examiner, PhD thesis, December 2015
Dr Sandra Frei, Internal Examiner, PhD thesis, March 2015
Dr Christopher Hocking, Internal Examiner, PhD thesis, December 2014
Dr Christopher Kosmas, Internal Examiner, PhD thesis, May 2014
Dr Sevasti Karatzouni, Internal Examiner, PhD thesis, February 2014
Dr Hataichanok Saevanee, Internal Examiner, PhD thesis, February 2014
Dr Karin Kronawitter, Internal Examiner, PhD thesis, January 2014
Dr Witold Thaul, Internal Examiner, PhD thesis, September 2013
Dr Mike Krey, Internal Examiner, PhD thesis, 2013
Dr Jan Muhammad, External Examiner, PhD thesis, University of Glasgow, October 2012
Dr Shuhaili Talib, Internal Examiner, PhD thesis, October 2012
Dr Benjamin Heckmann, Internal Examiner, PhD thesis, September 2012
Dr Nor Badrul Abuar Jumaat, Internal Examiner, PhD thesis, February 2012
Dr HaiYun Tian, External Examiner, PhD thesis, Teesside University, January 2012
Dr Aruna Thakur, Internal Examiner, PhD thesis, February 2007
Dr Nathan Luke Clarke, Internal Examiner, PhD thesis, September 2004
Invited presentations, lectures, etc.
Invited Speaker, Simple Errors=Serious Consequences, ECU Sri Lanka, 18th March 2024
Invited Speaker, History of VR/AI, ECU Sri Lanka, 16th March 2024
Presentation, Using Microsoft Azure Labs to develop and deliver virtual IT environments for teaching and learning, ACDICT ALTA Forum, 19-20 June 2024
Keynote Speaker, How AI is Changing Cyber, Cyber West Summit 24, Perth, 16th May 2024
Keynote Speaker, Simple Errors=Serious Consequences, IIT Madras, Chennai, India, 6th March 2024
Invited Speaker, Simple Errors=Serious Consequences, CERT, Colombo, Sri Lanka, 15th February 2024
Invited Speaker, Tracking technologies: Now everyone can be a spy, Virtusa, Colombo, Sri Lanka, 14th February 2024
Keynote Speaker, Simple Errors=Serious Consequences, University of Sri Jayewardenepura, Colombo, Sri Lanka, 14th February 2024
Invited Speaker, History of Cyber Security, Cyber West Summit 23, Perth, 10th May 2023
Panel Member, Business News 'The Future Of Cybersecurity' Sector Briefing, Crown Perth, 31st March 2023
Invited Speaker, Surveillance and Tracking, Computer Society of Sri Lanka, Colombo, Sri Lanka, 22nd February 2023
Keynote Speaker, The Cost of Cyber Crime, Auspire, 25th October 2022
Panel Member, UK Connect, Invest and Trade Western Australia, 12th August 2022
Keynote Speaker, Tracking technologies: From James Bond to everyone, IEEE-CSR Conference, 27-29 July 2022
Keynote Speaker, From TikTok to Pegasus: Communicating cyber to the masses, ECU Lecture Series, 31st May 2022
Keynote Speaker, Cyber security education, a perfect storm, ECUlture, ECU, 1st November 2021
Invited Speaker, Case study live demo, Cyber Security Asia, Malaysia, 11th October 2021
Invited Speaker and panel member,Cyber Security: protecting ourselves into the future?, Brand Launch, Optus Stadium, 22nd April 2021
Presentation, Invoice Fraud Case Study, 26th November 2020
Invited Speaker, What can we learn from a hack? Cyber Security Asia, Phnom Penh, Cambodia, 5th November 2019
Panel Member, Discovering the Digital Underworld: Privacy, the Dark Web, Tech & Democracy, Cyber Security Asia, Phnom Penh, Cambodia, 4th November 2019
Keynote Speaker, Lessons in Ethical Hacking, Computer Society of Sri Lanka, Colombo, Sri Lanka, 29th October 2019
Invited Speaker, Ethical Hacking, RSA Conference 2019, Asia Pacific and Japan, Singapore, 16th July 2019
Keynote Speaker, Evolving Cyber Risks for Organisations: Taking security seriously, Innovation Summit, Austrade, Cebu, Philippines, 24th May 2019
Keynote Speaker, Cyber Security: protecting ourselves into the future, Singapore Computer Society, Singapore, 22nd May 2019
Keynote Speaker, Ethical Hacking, IDP, Singapore, 11th May 2019
Invited Lecturer, IPICS Summer School, Leuven, Belgium, July 2006
Presentation, "Online Peer Assessment", Vice-Chancellor's Teaching and Learning Conference, Plymouth, June 2006
Keynote Speech, "Transparent User Authentication using Keystroke Analysis", 11th Conference on Human Computer Interaction, Oviedo, Spain, 22-24 March 2006
“Common Failings” and "Technical Requirements", Information Systems Security 1 Day Conference, Guernsey, 8 February 2006
Invited Lecturer, IPICS Winter School, Oulu, Finland, April 2004
Invited Lecturer, Guernsey Training Agency, Guernsey, December 2003, January 2004
Invited Lecturer, IPICS Summer School, Malaga, Spain, July 2003
Invited Lecturer, IPICS Winter School, Oulu, Finland, April 2003
Invited Lecturer, IPICS Summer School, Samos, Greece, July 2002
Other professional/academic activities/roles/duties