Research Staff Profile

Home People Profile...

Dr Paul S Haskell-Dowland BSc (Hons), PhD, FBCS, FHEA, SMIEEE, MACS (Snr) CP, IP3P

Associate Dean (Computing and Security), Edith Cowan University, Perth, Australia

Brief biographical information

p.haskelldowland@ecu.edu.au
http://www.cscan.org/pdowland

      

Dr Paul Haskell-Dowland is the Associate Dean for Computing and Security in the School of Science at Edith Cowan University, Perth, Australia and is an associate member of the Centre for Security, Communications & Network Research within the School of Computing, Electronics and Mathematics at Plymouth University in the United Kingdom.  His interests include network and system security, teaching and learning technologies, and security education.  Dr Haskell-Dowland is the secretary to the International Federation for Information Processing (IFIP) working group 11.1 (Information Security Management), a Fellow of the Higher Education Authority, a Senior Member of the IEEE, an Honorary Fellow of the Sir Alister Hardy Foundation for Ocean Science, a Fellow of the BCS and a Senior Member of the ACS/Certified Professional.  He is the author of over 60 papers in refereed international journals and conference proceedings, edited 29 proceedings and co-authored "E-Mail Security: A Pocket Guide" (2010).  Paul can be followed on Twitter (@pdowland).

Research interests

  • Information Systems Security
  • Internet and WWW Technologies
  • Learning & Learner Technologies/Analytics

Education/qualifications

  • 2013 Fellow of the Higher Education Academy (FHEA)
  • 2013 EC-Council, Certified Ethical Hacker (CEH)
  • 1998-2004 PhD, "User Authentication and Supervision in Networked Systems"
  • 2000-2001 Postgraduate Certificate of Learning and Teaching in Higher Education (LTHE)
  • 1994-1998 B.Sc. (Hons) Computing and Informatics (1st Class)

Professional memberships

  • Senior Member of the ACS - Certified Professional MACS (Snr) CP and IP3P, December 2016
  • SMIEEE (Senior Member of the IEEE), April 2016
  • Member of the Council of Professors and Heads of Computing (CPHC), September 2015
  • MIEEE (Member of the IEEE), August 2015
  • Member of the IFIP TC 11 Working Group 11.12 on Human Aspects of Information Security and Assurance
  • Secretary & Webmaster, IFIP TC11 Working Group 11.1 on Information Security Management, August 2004
  • Branch Committee Member & Webmaster, BCS South West, April 2004
  • FBCS (Fellow of British Computer Society), September 2010
  • MBCS (Member of British Computer Society), April 2004

External appointments

  • External examiner, MSc Information Technology and MSc Software Development at the University of Glasgow, January 2014 - December 2016
  • External examiner, Information Technology, Information Technology with Management, Information Technology with Economics, Business Information Technology awards at the University of Reading, October 2007 - September 2011
  • Programme validation event - external panel member, MSc Computer Networking, NEWI, May 2007
  • External examiner, MSc Computing, Computer Science, Forensic Computing, Distance Learning, Multimedia and Web Multimedia awards at the University of Stafford, January 2007 - December 2011
  • SAHFOS Honorary Fellow in recognition of work to develop the WinCPR, North Sea Plankton Database, April 2005 (renewed 2015)
  • Programme validation event - external panel member, University of Portsmouth, May 2005
  • Programme validation event - external panel member, University of Greenwich at Medway, March 2005

Journal papers

Adaptive Behavioral Profiling for Identity Verification in Cloud Computing: A Model and Preliminary Analysis
Al-Bayati B, Clarke NL, Dowland PS
GSTF Journal on Computing (JOC), ISSN:2251-3043, Vol. 5, Iss.1, pp21-28, 2016
Winner of the Best Student Paper award at the 7th Annual International Conference on ICT: Big Data, Cloud and Security (ICT-BDCS 2016).
More details | External link available

Secure Graphical One Time Password (GOTPass): An Empirical Study
Alsaiari H, Papadaki M, Dowland PS, Furnell SM
Information Security Journal: A Global Perspective, 24, pp207-220, 2015
More details | External link available

Security Factors Influencing End Users' Adoption of E-Government
Alharbi N, Papadaki M, Dowland PS
Journal of Internet Technology and Secured Transaction (JITST), Volume 3, Issues 3/4, pp320-328, 2014
More details | External link available

Investigating the Viability of Multifactor Graphical Passwords for User Authentication
Jali MZ, Furnell SM, Dowland PS
Information Security Journal: A Global Perspective, 00:1–12, ISSN: 1939-3555, Published online: 18 Apr 2014, 2014
More details | External link available

Active authentication for mobile devices utilising behaviour profiling
Li F, Clarke NL, Papadaki M, Dowland PS
International Journal of Information Security, Volume 13, Issue 3, pp229-244, ISSN:1615-5262, 2014
More details | External link available

Misuse Detection for Mobile Devices Using Behaviour Profiling
Li F, Clarke NL, Papadaki M, Dowland PS
International Journal of Cyber Warfare & Terrorism, Volume 1, Issue 1, pp43-55, ISSN: 1947-3435, 2011
More details | External link available

Massively Multi-Player Online Role Playing Games: What’s the Risk?
Sanders B, Dowland PS, Atkinson S, Furnell SM
Journal of Virtual Worlds Research, vol. 3, no. 3, ISSN: 1941-8477, 2011
More details | External link available

Online Addiction: A Cultural Comparison of Privacy Risks in Online Gaming Environments
Sanders B, Dowland PS, Atkinson S, Zahra D, Furnell SM, Papadaki M
Journal of Multimedia Processing Technologies, vol. 1, no. 3, September, pp181-193, ISSN: 0976-4127, 2010
More details | External link available

Assessing image-based authentication techniques in a web-based environment
Jali MZ, Furnell SM, Dowland PS
Information Management & Computer Security, Vol.18, Iss.1, pp43-53, 2010
More details | External link available

An automated framework for managing security vulnerabilities
Alayed A, Furnell SM, Zhao D, Dowland PS
Information Management & Computer Security, vol. 13, no. 2, pp156-166, 2005
More details

A long-term trial of alternative user authentication technologies
Furnell SM, Papadopoulos I, Dowland PS
Information Management and Computer Security, Vol. 12, No. 2, pp178-190, 2004
More details

A prototype tool for information security awareness and training
Furnell SM, Gennatou M, Dowland PS
International Journal of Logisitics Information Management, vol. 15, no. 5, pp352-357, 2002
More details | Download PDF

An experimental comparison of secret-based user authentication technologies
Irakleous I, Furnell SM, Dowland PS, Papadaki M
Information Management and Computer Security, vol. 10, no. 3, pp100-108, 2002
More details | Download PDF

Security analysers: Administrator Assistants or Hacker Helpers?
Furnell SM, Chiliarchaki P, Dowland PS
Information Management and Computer Security, vol. 9, no.2, pp93-101, 2001
More details | Download PDF

Authentication and Supervision: A survey of user attitudes
Furnell SM, Dowland PS, Illingworth HM, Reynolds PL
Computers & Security, vol. 19, no. 6, pp529-539, 2000
Please note: the electronic copy of the survey referred to in this paper is no longer available.
More details | Download PDF

A conceptual architecture for real-time intrusion monitoring
Furnell SM, Dowland PS
Information Management and Computer Security, vol. 8, no. 2, pp65-74, 2000
More details | Download PDF

Computer Crime and Abuse: A Survey of Public Attitudes and Awareness
Dowland PS, Furnell SM, Illingworth HM, Reynolds PL
Computers & Security, vol. 18, no. 8, pp715-726, 1999
Please note: the electronic copy of the survey referred to in this paper is no longer available.
More details | Download PDF

Dissecting the 'Hacker Manifesto'
Furnell SM, Dowland PS, Sanders P
Information Management and Computer Security, vol.7, no.2 pp69-75, 1999
More details | Download PDF

18 Journal papers

Conference papers

Activity Recognition using wearable computing
Al-Naffakh N, Clarke NL, Dowland PS, Li F
11th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 189-195, Barcelona, Spain, 2016
More details | External link available

Increasing eLearning Engagement Using Mobile Technologies
Triantafyllidis A, Clarke NL, Dowland PS, Vranopoulos G
9th annual International Conference of Education, Research and Innovation (ICERI2016), 14-16 November, Seville, Spain, pp8644-8653, ISBN: 978-84-617-5895-1, ISSN: 2350-1095, 2016
More details | External link available

The Value of the Biometrics in Invigilated E-Assessments
Ketab S, Clarke NL, Dowland PS
Proceedings of the the 8th Annual International Conference on Education and New Learning Technologies, Barcelona, Spain, 4-6 July, ISBN: 978-84-608-8860-4, ISSN: 2340-1117, 2016
More details | External link available

A Review of Graphical Authentication Utilising a Keypad Input Method
Alsaiari H, Papadaki M, Dowland PS, Furnell SM
Proceedings of The 8th Saudi Students Conference, January 31 - February 1, pp359-374, 2015
More details | External link available

E-Invigilation of E-Assessments
Ketab S, Clarke NL, Dowland PS
Proceedings of INTED2015 Conference 2nd-4th March 2015, Madrid, Spain, ISBN: 978-84-606-5763-7, 2015
More details

Security challenges of e-government adoption based on end users' perspective
Alharbi N, Papadaki M, Dowland PS
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions (ICITST 2014), London, UK, pp78-82, ISBN: 978-1-908320-39-1, 2014
More details | External link available

Alternative Graphical Authentication for Online Banking Environments
Alsaiari H, Papadaki M, Dowland PS, Furnell SM
Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2014), Plymouth, UK, July 8-9, pp122-136, ISBN: 978-1-84102-375-5, 2014
Can be ordered on-line.
More details | Download PDF

Connected In-Car Multimedia: Qualities Affecting Composability of Dynamic Functionality
Knirsch A, Wietzke J, Moore R, Dowland PS
Proceedings of the Tenth International Network Conference (INC 2014), Plymouth, UK, July 8-9, pp81-93, ISBN: 978-1-84102-373-1, 2014
Can be ordered on-line.
More details | Download PDF

Nonvisual Presentation and Navigation within the Structure of Digital Text-Documents on Mobile Devices
Dorigo M, Harriehausen-Mühlbauer B, Stengel I, Dowland PS
7th International Conference, UAHCI 2013, Las Vegas, NV, USA, July 21-26, ISBN: 978-3-642-39193-4, pp311-320, 2013
More details | External link available

Learning management systems in higher education: a faculty perspective
Triantafyllidis A, Clarke NL, Dowland PS
6th International Conference of Education, Research and Innovation (ICERI2013), Madrid, Spain, ISBN: 978-84-616-3847-5, pp5120-5130, 2013
More details | External link available

E-Invigilator: A Biometric-Based Supervision System for e-Assessments
Clarke NL, Dowland PS, Furnell SM
The International Conference on Information Society (i-Society 2013), Toronto, Canada, 24-26 June, 2013
More details

Learning management systems in higher education: a student perspective
Triantafyllidis A, Clarke NL, Dowland PS
5th International Conference of Education, Research and Innovation (ICERI2012), Madrid, Spain, ISBN: 978-84-616-0763-1, pp4046-4055, 2012
More details | External link available

Assessing the usability of application level security warnings
Zaaba ZF, Furnell SM, Dowland PS, Stengel I
Eleventh Annual Security Conference, Las Vegas, Nevada, US, 11-13 April, 2012
More details

Survey: improving document accessibility from the blind and visually impaired user's point of view
Dorigo M, Harriehausen-Mühlbauer B, Stengel I, Dowland PS
Proceedings of the 6th International Conference on Universal Access in Human-Computer Interaction. Applications and Services, pp129-135, 978-3-642-21656-5, 2011
More details | External link available

Multifactor Graphical Passwords: An Assessment of End-User Performance
Jali MZ, Furnell SM, Dowland PS
Proceedings of the 7th International Conference of Information Assurance & Security (IAS2011), Melaka, Malaysia, 5-8 December 2011. IEEE 978-1-4577-2153-3, 2011
More details

Quantifying the effect of graphical password guidelines for better security
Jali MZ, Furnell SM, Dowland PS
Future Challenges in Security and Privacy for Academia and Industry (SEC 2011), Lucerne, Switzerland, 7-9 June 2011. Volume 354/2011, Springer-Verlag, pp80-91, 2011
More details | External link available

Resource Management for Multicore Aware Software Architectures of In-Car Multimedia Systems
Knirsch A, Wietzke J, Moore R, Dowland PS
Lecture Notes in Informatics (LNI) - Proceedings, Series of the Gesellschaft für Informatik (GI), Volume P-192, 9th Workshop Automotive Software Engineering, INFORMATIK 2011: Informatik schafft Communities, 4.–7. October 2011, Berlin, p216, ISBN: 978-3-88579-286-4, (full text is available online), 2011
More details | External link available

Emerging risks in massively multiplayer online role playing games
Sanders B, Atkinson S, Dowland PS, Furnell SM, Papadaki M
EU Kids Online Conference, Friday 23 September, New Academic Building LSE, 2011
More details | External link available

Behaviour Profiling for Transparent Authentication for Mobile Devices
Li F, Clarke NL, Papadaki M, Dowland PS
Proceedings of the 10th European Conference on Information Warfare and Security (ECIW), Tallinn, Estonia 7-8 July, pp307-314, 2011
Awarded best PhD paper.
More details

End-User Perception and Usability of Information Security
Zaaba ZF, Furnell SM, Dowland PS
Proceedings of the Fifth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2011), London, UK, ISBN: 978-1-84102-284-0, pp97-107, 2011
Can be ordered on-line.
More details | Download PDF

Online Addiction: Privacy Risks in Online Gaming Environments
Sanders B, Chen V, Zahra D, Dowland PS, Atkinson S, Papadaki M, Furnell SM
Proceedings of the International Conference on Management of Emergent Digital EcoSystems (MEDES), October 26-29, Bangkok, Thailand, 2010
More details

Behaviour Profiling on Mobile Devices
Li F, Clarke NL, Papadaki M, Dowland PS
International Conference on Emerging Security Technologies, 6-8 September, Canterbury, UK, pp77-82, 2010
More details | External link available

Implications and Risks of MMORPG Addiction: Motivations, Emotional Investment, Problematic Usage and Personal Privacy
Sanders B, Dowland PS, Furnell SM
Proceedings of the South African Information Security Multi-Conference (SAISMC 2010), Port Elizabeth, South Africa, 17-18 May, ISBN: 978-1-84102-256-7, pp61-73, 2010
Can be ordered on-line.
More details | Download PDF

A Critical Evaluation of an Online Peer Assessment System (OPAS)
Clarke NL, Dowland PS
Proceedings of the International Conference of Education, Research and Innovation (ICERI 2009), 16-18th November, Madrid, Spain, 2009
More details | Download PDF

Evaluating Web-Based User Authentication using Graphical Techniques
Jali MZ, Furnell SM, Dowland PS
Proceedings of the Third International Symposium on Human Aspects of Information Security & Assurance (HAISA 2009), Athens, Greece, ISBN: 978-1-84102-231-4, pp108-118, 2009
Can be ordered on-line.
More details | Download PDF

An Assessment of People’s Vulnerabilities in Relation to Personal and Sensitive Data
Sanders B, Dowland PS, Furnell SM
Proceedings of the Third International Symposium on Human Aspects of Information Security & Assurance (HAISA 2009), Athens, Greece, ISBN: 978-1-84102-231-4, pp50-60, 2009
Can be ordered on-line.
More details | Download PDF

Service-Oriented Architecture: Performance Issues and Approaches
Swientek M, Bleimann U, Dowland PS
Proceedings of the Seventh International Network Conference (INC2008), Plymouth, UK, 8-10 July, pp261-269, 2008
Can be ordered on-line.
More details

A practical usability evaluation of security features in end-user applications
Furnell SM, Katsabas D, Dowland PS, Reid F
Proceedings of the 22nd IFIP International Information Security Conference (IFIP SEC 2007), Sandton, South Africa, 14-16 May, pp. 205-216, 2007
More details

Considering the Usability of End-User Security Software
Furnell SM, Jusoh A, Katsabas D, Dowland PS
Proceedings of 21st IFIP International Information Security Conference (IFIP SEC 2006), Karlstad, Sweden, 22-24 May, pp307-316, 2006
More details

Using Human Computer Interaction principles to promote usable security
Katsabas D, Furnell SM, Dowland PS
Proceedings of Fifth International Network Conference (INC 2005), July 5-7, Samos, Greece, pp235-242, 2005
More details | Download PDF

Identifying the security requirements for virtual university environments
Ruiz VC, Furnell SM, Phippen AD, Dowland PS, Stengel I, Bleimann U
Proceedings of the Fourth Security Conference 2005, Las Vegas, USA, 30-31 March, 2005
More details | Download PDF

Survey of Wireless Access Point Security
Voisin M, Ghita BV, Dowland PS
Proceedings of the Fourth Security Conference 2005, Las Vegas, USA, 30-31 March, 2005
More details | Download PDF

PassImages : an alternative method of user authentication
Charruau D, Furnell SM, Dowland PS
Proceedings of the ISOneWorld 2005, Las Vegas, USA, 30 March - 1 April, 2005
More details | Download PDF

A Long-term Trial of Keystroke Profiling using Digraph, Trigraph and Keyword Latencies
Dowland PS, Furnell SM
Proceedings of IFIP/SEC 2004 - 19th International Conference on Information Security, Toulouse, France, 23-26 August, pp275-289, 2004
More details

A Correlation Framework for Continuous User Authentication Using Data Mining
Singh H, Furnell SM, Dowland PS, Lines BL, Kaur S
Proceedings of the Fourth International Network Conference (INC 2004), Plymouth, UK, 6-9 July 2004, pp237-245, 2004
More details | Download PDF

Improving Security Awareness And Training Through Computer-Based Training
Furnell SM, Warren A, Dowland PS
Proceedings of the WISE Conference, Monterey, USA, July, pp287-301, 2003
More details | Download PDF

Assessing IT Security Culture: System Administrator and End-User
Finch J, Furnell SM, Dowland PS
Proceedings of ISOneWorld Conference 2003, Las Vegas, USA, April 23-25, CD Only, 2003
More details | Download PDF

Critical awareness ? The problem of monitoring security vulnerabilities
Furnell SM, Alayed A, Barlow I, Dowland PS
Proceedings of European Conference on Information Warfare and Security, 8-9 July 2002, Brunel, UK, pp85-92, 2002
More details | Download PDF

Keystroke Analysis as a Method of Advanced User Authentication and Response
Dowland PS, Furnell SM, Papadaki M
Proceedings of IFIP/SEC 2002 - 17th International Conference on Information Security, Cairo, Egypt, 7-9 May, pp215-226, 2002
More details

A Preliminary Investigation of User Authentication Using Continuous Keystroke Analysis
Dowland PS, Singh H, Furnell SM
Proceedings of the IFIP 8th Annual Working Conference on Information Security Management & Small Systems Security, Las Vegas, 27-28 September, 2001
More details | Download PDF

Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining
Singh H, Furnell SM, Lines BL, Dowland PS
Proceedings of International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security, St. Petersburg, Russia, 21-23 May, 2001
More details | Download PDF

A Generic Taxonomy for Intrusion Specification and Response
Furnell SM, Magklaras GB, Papadaki M, Dowland PS
Proceedings of Euromedia 2001, Valencia, Spain, 18-20 April, 2001
More details | Download PDF

Promoting security awareness and training within small organisations
Furnell SM, Gennatou M, Dowland PS
Proceedings of the First Australian Information Security Management (AISM) Workshop, Geelong, Australia, 7 November, 2000
More details | Download PDF

A conceptual intrusion monitoring architecture and thoughts on practical implementation
Dowland PS, Furnell SM
Proceedings of the World Computer Congress 2000, 21-25 August, 2000
More details | Download PDF

Enhancing Operating System Authentication Techniques
Dowland PS, Furnell SM
Proceedings of the Second International Network Conference (INC 2000), Plymouth, UK, pp253-261, 3-6 July, 2000
More details | Download PDF

Developing tools to support online distance learning
Furnell SM, Evans MP, Dowland PS
Proceedings of EUROMEDIA 2000, Antwerp, Belgium, 8-10 May, 2000
More details | Download PDF

46 Conference papers

Books

E-mail Security: A Pocket Guide
Furnell SM, Dowland PS
IT Governance Publishing, ISBN: 978-1849280969, pp108, 2010
More details | External link available

1 Books

Edited books

Advances in Communications, Electronics, Networks, Robotics and Security Volume 13
Dowland PS
Plymouth University, ISBN: 978-1-326-72810-6, pp160, 2016
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the Eleventh International Network Conference (INC 2016)
Alekseev S, Dowland PS, Ghita BV, Schneider O
Frankfurt, Germany, 19-21 July, ISBN: 978-1-84102-410-3, pp192, 2016
Support independent publishing: Buy this book on Lulu.
More details | External link available

Advances in Communications, Computing, Electronics, Networks, Robotics and Security Volume 12
Dowland PS
Plymouth University, ISBN: 978-1-326-72586-0, pp172, 2015
Support independent publishing: Buy this book on Lulu.
More details | External link available

Advances in Communications, Computing, Networks and Security Volume 11
Dowland PS
Plymouth University, ISBN: 978-184102-374-8, pp144, 2014
Support independent publishing: Buy this book on Lulu.
More details | Download PDF | External link available

Proceedings of the Tenth International Network Conference (INC 2014)
Dowland PS, Furnell SM, Ghita BV
Plymouth, 8-10 July, ISBN: 978-1-84102-373-1, pp197, 2014
Support independent publishing: Buy this book on Lulu.
More details | External link available

Advances in Communications, Computing, Networks and Security Volume 10
Dowland PS, Furnell SM
Plymouth University, ISBN: 978-184102-358-8, pp229, 2013
Support independent publishing: Buy this book on Lulu.
More details | Download PDF | External link available

Proceedings of the Ninth International Network Conference (INC 2012)
Botha RA, Dowland PS, Furnell SM
Port Elizabeth, South Africa, 11-12 July, ISBN: 9781841023151, pp238, 2012
Support independent publishing: Buy this book on Lulu.
More details | External link available

Advances in Communications, Computing, Networks and Security Volume 9
Dowland PS, Furnell SM
Plymouth University, ISBN: 978-184102-320-5, pp217, 2012
Support independent publishing: Buy this book on Lulu.
More details | Download PDF | External link available

Advances in Communications, Computing, Networks and Security Volume 8
Dowland PS, Furnell SM
Plymouth University, ISBN: 978-1-84102-293-2, pp293, 2011
Support independent publishing: Buy this book on Lulu.
More details | Download PDF | External link available

Proceedings of the Seventh Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2011)
Dowland PS, Grout VM, Humm B, Knahl MH
Plymouth University, ISBN: 978-1-84102-295-6, pp117, 2011
Support independent publishing: Buy this book on Lulu.
More details | External link available

Advances in Communications, Computing, Networks and Security Volume 7
Dowland PS, Furnell SM
Plymouth University, ISBN: 978-1-84102-283-3, pp285, 2010
Support independent publishing: Buy this book on Lulu.
More details | Download PDF | External link available

Proceedings of the Sixth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2010)
Dowland PS, Humm B, Knahl MH
University of Plymouth, ISBN: 978-1-84102-269-7, pp81, 2010
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the Eighth International Network Conference (INC 2010)
Bleimann U, Dowland PS, Furnell SM, Schneider O
Heidelberg, Germany, 8-10 July, ISBN: 978-1-84102-259-8, pp413, 2010
Support independent publishing: Buy this book on Lulu.
More details | External link available

Advances in Communications, Computing, Networks and Security 6
Dowland PS, Furnell SM
University of Plymouth, ISBN: 978-1-84102-258-1, pp321, 2009
Support independent publishing: Buy this book on Lulu.
More details | Download PDF | External link available

Proceedings of the Fifth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2009)
Bleimann U, Dowland PS, Furnell SM, Grout VM
University of Plymouth, ISBN: 978-1-84102-236-9, 223pp, 2009
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the 11th IFIP TC 11.1 Working Conference on Information Security Management
Dowland PS, Furnell SM
Richmond, Virginia on 16-17 October, ISBN: 978-3-901882-31-9, pp127, 2008
Support independent publishing: Buy this book on Lulu.
More details

Advances in Communications, Computing, Networks and Security 5
Dowland PS, Furnell SM
University of Plymouth, ISBN: 978-1-84102-257-4, pp323, 2008
Support independent publishing: Buy this book on Lulu.
More details | Download PDF | External link available

Proceedings of the Fourth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2008)
Bleimann U, Dowland PS, Furnell SM, Grout VM
University of Plymouth, ISBN: 978-1-84102-196-6, 215pp, 2008
Support independent publishing: Buy this book on Lulu.
More details

Proceedings of the 7th International Network Conference (INC 2008)
Dowland PS, Furnell SM
University of Plymouth, ISBN: 978-1-84102-188-1, 289pp, 2008
Support independent publishing: Buy this book on Lulu.
More details | External link available

Advances in Networks, Computing and Communications 4
Dowland PS, Furnell SM
University of Plymouth, ISBN: 978-1-84102-180-5, pp304, 2007
Support independent publishing: Buy this book on Lulu.
More details | Download PDF | External link available

Proceedings of the Third Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2007)
Bleimann U, Dowland PS, Furnell SM
University of Plymouth, ISBN: 978-1-8410-2173-7, 273pp, 2007
Support independent publishing: Buy this book on Lulu.
More details

Advances in Networks, Computing and Communications 3
Dowland PS, Furnell SM
University of Plymouth, ISBN: 978-1-8410-2179-9, pp277, 2006
Support independent publishing: Buy this book on Lulu.
More details | Download PDF | External link available

Proceedings of the 6th International Network Conference (INC 2006)
Furnell SM, Dowland PS
University of Plymouth, ISBN 1-84102-157-1, 428pp, 2006
Support independent publishing: Buy this book on Lulu.
More details | External link available

Security Management, Integrity, and Internal Control in Information Systems
Dowland PS, Furnell SM, Thuraisingham B, Wang XS
Springer, ISBN 0-387-29826-6. 373pp, 2005
More details

Advances in Network and Communications Engineering 2
Furnell SM, Dowland PS
University of Plymouth, ISBN: 1-84102-140-7, pp191, 2005
Support independent publishing: Buy this book on Lulu.
More details | Download PDF | External link available

Proceedings of the 5th International Network Conference (INC 2005)
Furnell SM, Dowland PS, Kormentzas G
University of the Aegean & University of Plymouth, ISBN 978-1-84102-272-7, 576pp, 2005
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the 4th International Network Conference (INC 2004)
Furnell SM, Dowland PS
University of Plymouth, ISBN 1 84102 125 3, 592pp, 2004
Support independent publishing: Buy this book on Lulu.
More details | External link available

Proceedings of the 8th Annual Scientific Conference (Euromedia 2003)
Furnell SM, Dowland PS
Eurosis, ISBN 90-77301-01-5, 222pp, 2003
More details

Proceedings of the 3rd International Network Conference (INC 2002)
Furnell SM, Dowland PS
University of Plymouth, ISBN 1-84102-105-9, 638pp, 2002
Support independent publishing: Buy this book on Lulu.
More details | External link available

29 Edited books

Contributions to edited books

User Authentication Technologies
Clarke NL, Dowland PS, Furnell SM
in Securing Information and Communications Systems: Principles, Technologies, and Applications. S.M.Furnell, S.K.Katsikas, J.Lopez and A.Patel (Eds), Artech House, ISBN 978-1-59693-228-9, pp35-59, 2008
Available on-line.
More details

Security Concepts, Services, and Threats
Dowland PS, Furnell SM
in Securing Information and Communications Systems: Principles, Technologies, and Applications. S.M.Furnell, S.K.Katsikas, J.Lopez and A.Patel (Eds), Artech House, ISBN 978-1-59693-228-9, pp5-20, 2008
Available on-line.
More details

2 Contributions to edited books

Posters

3D Facial Recognition and Eye Tracking
Ketab S, Clarke NL, Dowland PS
The Postgraduate Society Conference, 16th March 2016, Plymouth University, 2016
More details

E-invigilation of E-Assessments
Ketab S, Clarke NL, Dowland PS
The Postgraduate Society Conference, 19th March, Plymouth University, 2014
More details | Download PDF

Enhancing Intrusion Response in Networked System
Papadaki M, Furnell SM, Dowland PS, Lines BL, Reynolds PL
Poster presentation at Britain's Younger Engineers in 2002, House of Commons, London, 9 December, 2002
More details | Download PDF

Non-Intrusive Subscriber Authentication for 3G Mopbile System
Clarke NL, Dowland PS, Furnell SM, Reynolds PL, Rodwell PM
Poster presentation at Britain's Younger Engineers in 2001, House of Commons, London, 3 December, 2001
More details | Download PDF

Advanced Authentication and Intrusion Detection Technologies
Dowland PS, Furnell SM, Magklaras GB, Papadaki M, Reynolds PL, Rodwell PM, Singh H
Poster presentation at Britain's Younger Engineers in 2000, House of Commons, London, 4 December, 2000
More details | Download PDF

5 Posters

Internal publications

Firewall Rulebase Analysis Tool
Jain P, Dowland PS
Advances in Communications, Computing, Networks and Security Volume 10, ISBN: 978-1-84102-358-8, pp96-103, 2013
Can be ordered on-line.
More details | Download PDF

Evaluation of Current E-Safety Software
Latif Z, Dowland PS
Advances in Communications, Computing, Networks and Security Volume 8, ISBN: 978-1-84102-293-2, pp76-87, 2011
Can be ordered on-line.
More details | Download PDF

Operational Business Intelligence – A Key to Just-in-Time Decision Making (JDM)
Saeed B, Knahl MH, Frey-Luxemburger M, Dowland PS
Proceedings of the Seventh Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2011), Furtwangen, Germany, ISBN: 978-1-84102-295-6, pp77-87, 2011
Can be ordered on-line.
More details | Download PDF | External link available

System Design for Embedded Automotive Systems
Vergata S, Wietzke J, Schütte A, Dowland PS
Proceedings of the Sixth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2010), Plymouth, UK, ISBN: 978-1-84102-269-7, pp53-60, 2010
Can be ordered on-line.
More details | Download PDF

An Approach for Structuring Heterogeneous Automotive Software Systems by use of Multicore Architectures
Knirsch A, Wietzke J, Moore R, Dowland PS
Proceedings of the Sixth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2010), Plymouth, UK, ISBN: 978-1-84102-269-7, pp19-30, 2010
Can be ordered on-line.
More details | Download PDF

Web-Based Plankton Data Visualisation
Ho TT, Dowland PS
Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp285-293, 2009
Can be ordered on-line.
More details | Download PDF

Implementation of the Least Privilege Principle on Windows XP, Windows Vista and Linux
Scalbert L, Dowland PS
Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp226-233, 2009
Can be ordered on-line.
More details | Download PDF

An Assessment of People's Vulnerabilities in Relation to Personal and Sensitive Data
Sanders B, Dowland PS
Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp124-134, 2009
Can be ordered on-line.
More details | Download PDF

CentOS Linux 5.2 and Apache 2.2 vs. Microsoft Windows Web Server 2008 and IIS 7.0 when Serving Static and PHP Content
Moore DJ, Dowland PS
Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp92-97, 2009
Can be ordered on-line.
More details | Download PDF

Network Security, Guidelines to Build a Security Perimeter for SMEs
Godon S, Dowland PS
Advances in Communications, Computing, Networks and Security 6, ISBN: 978-1-84102-258-1, pp40-47, 2009
Can be ordered on-line.
More details | Download PDF

A SOA Middleware for High-Performance Communication
Swientek M, Humm B, Bleimann U, Dowland PS
Proceedings of the Fifth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2009), Darmstadt, Germany, ISBN: 978-1-84102-236-9, pp123-133, 2009
Can be ordered on-line.
More details | Download PDF

Online Gaming: An Emerging Avenue for Exploitation?
Sanders B, Dowland PS, Furnell SM
Proceedings of the Fifth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2009), Darmstadt, Germany, ISBN: 978-1-84102-236-9, pp29-42, 2009
Can be ordered on-line.
More details | Download PDF

Investigating Options of Securing Web Application
Meemeskul T, Dowland PS
Advances in Communications, Computing, Networks and Security 5, ISBN: 978-1-84102-257-4, pp267-273, 2008
Can be ordered on-line.
More details | Download PDF

Investigating, Implementing and Evaluating Client-Side Keystroke Analysis User Authentication for Web Sites
Hocking C, Dowland PS
Advances in Communications, Computing, Networks and Security 5, ISBN: 978-1-84102-257-4, pp126-134, 2008
Can be ordered on-line.
More details | Download PDF

Implementing a Visual Network Management Console
Agbai OC, Dowland PS
Advances in Communications, Computing, Networks and Security 5, ISBN: 978-1-84102-257-4, pp89-98, 2008
Can be ordered on-line.
More details | Download PDF

A Survey of User Opinions and Preference Towards Graphical Authentication
Jali MZ, Furnell SM, Dowland PS, Reid F
Proceedings of the Fourth Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2008), Wrexham, UK, ISBN: 978-1-84102-196-6, pp11-20, 2008
Can be ordered on-line.
More details | Download PDF

Web-based Plankton Data Visualisation
Aung TY, Dowland PS
Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp173-181, 2007
Can be ordered on-line.
More details | Download PDF

Information Security Awareness & Training
Al-Ghatam H, Dowland PS
Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp157-163, 2007
Can be ordered on-line.
More details | Download PDF

A guide for small and medium enterprise of implementing security and firewall system
Zhang R, Dowland PS
Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp146-153, 2007
Can be ordered on-line.
More details | Download PDF

VoIP Security Threats and Vulnerabilities
Rizvi SMA, Dowland PS
Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp114-122, 2007
Can be ordered on-line.
More details | Download PDF

The Art of Network Monitoring
Mohyuddin A, Dowland PS
Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp100-105, 2007
Can be ordered on-line.
More details | Download PDF

Implementing Network Monitoring Tools
Asiwe VC, Dowland PS
Advances in Network & Communication Engineering 4, ISBN: 978-1-84102-180-5, pp3-10, 2007
Can be ordered on-line.
More details | Download PDF

Social Engineering: A growing threat, with diverging directions
Chelleth JV, Furnell SM, Papadaki M, Pinkney G, Dowland PS
Advances in Network & Communication Engineering 3, pp179-184, 2006
Can be ordered on-line.
More details | Download PDF

Security and Risk Analysis of VoIP Networks
Feroz S, Dowland PS
Advances in Network & Communication Engineering 3, pp83-89, 2006
Can be ordered on-line.
More details | Download PDF

Implementing a network operations centre management console: Netmates
Bali R, Dowland PS
Advances in Network & Communication Engineering 3, pp75-82, 2006
Can be ordered on-line.
More details | Download PDF

Design of an Architecture for Wireless Community Networks
Perry A, Dowland PS
Advances in Network & Communication Engineering 2, pp93-101, 2005
More details

Approaches to Establishing IT Security Culture
Langue C, Furnell SM, Dowland PS
Advances in Network & Communication Engineering 2, pp43-48, 2005
More details

Passimages : An Alternative Method of User Authentication
Charruau D, Furnell SM, Dowland PS
Advances in Network & Communication Engineering 2, pp3-10, 2005
More details

Security Analysis Tools - Do They Make Any Difference?
Bolakis S, Furnell SM, Dowland PS
Advances in Network & Communication Engineering, pp29-37, 2004
More details

29 Internal publications

Other publications

Using student analytics to improve the student experience and underpin success at university
Dowland PS
Professionals in International Education, June 27, 2014
More details | External link available

Adapting to analytics
Dowland PS
Education Technology & Wildfire Comms, 2 June 2014, 2014
More details | External link available

Collecting data on students: is it useful to know which books they've read?
Dowland PS
The Guardian Higher Education Network , 29 April 2014, 2014
More details | External link available

3 Other publications

133 publication(s) - all categories.

Editorships / Refereeing for journals

Conferences organised

Other international conference activities

Current MPhil/PhD Supervisions

Completed MPhil/PhD Supervisions

Examination of research degrees

  • Dr Timm Heuss, Internal Examiner, PhD thesis, December 2016
  • Dr Thomas Rübsamen, Internal Examiner, PhD thesis, November 2016
  • Dr Janet Kneller, Internal Examiner, PhD thesis, December 2015
  • Dr Sandra Frei, Internal Examiner, PhD thesis, March 2015
  • Dr Christopher Hocking, Internal Examiner, PhD thesis, December 2014
  • Dr Christopher Kosmas, Internal Examiner, PhD thesis, May 2014
  • Dr Sevasti Karatzouni, Internal Examiner, PhD thesis, February 2014
  • Dr Hataichanok Saevanee, Internal Examiner, PhD thesis, February 2014
  • Dr Karin Kronawitter, Internal Examiner, PhD thesis, January 2014
  • Dr Witold Thaul, Internal Examiner, PhD thesis, September 2013
  • Dr Mike Krey, Internal Examiner, PhD thesis, 2013
  • Dr Jan Muhammad, External Examiner, PhD thesis, University of Glasgow, October 2012
  • Dr Shuhaili Talib, Internal Examiner, PhD thesis, October 2012
  • Dr Benjamin Heckmann, Internal Examiner, PhD thesis, September 2012
  • Dr Nor Badrul Abuar Jumaat, Internal Examiner, PhD thesis, February 2012
  • Dr HaiYun Tian, External Examiner, PhD thesis, Teesside University, January 2012
  • Dr Aruna Thakur, Internal Examiner, PhD thesis, February 2007
  • Dr Nathan Luke Clarke, Internal Examiner, PhD thesis, September 2004

Invited Presentations, Lectures, etc.

  • Invited Speaker, Practical Exploitation, Secure South West 6, Plymouth, 9th February 2016
  • Invited Chair, Effectively Utilising Higher Education Data, Inside Government, London, 26th November 2015
  • Workshop, "Making it easier to be effective tutors - the role of S3", Vice-Chancellor's Teaching and Learning Conference, Plymouth, 26th June 2015
  • Poster, "What can S3 do for you (and your students)?", Vice-Chancellor's Teaching and Learning Conference, Plymouth, 26th June 2015
  • Invited Presentation, South West Cyber Security Cluster: Cyber Security Survival Strategy, Exeter, 21 May 2015
  • Invited Panel Member, Tackling student welfare issues and improving student retention, Westminster Higher Education Forum, London, 5th March 2015
  • Invited Chair and Case Study Presentation, Higher Education Data: Redesigning the Information Landscape, Inside Government, London, 12th November 2014
  • Invited Panel Member, Are today’s security technologies usable enough?, Secure South West 4, Plymouth, 10th July 2014
  • Invited Panel Member, Future Challenges in Cyber Security, Secure South West 3, Plymouth, 16th December 2013
  • Masterclass, "Introduction to and demo of S3 (Student Support System)", Vice-Chancellor's Teaching and Learning Conference, Plymouth, 28th June 2013
  • Invited Speaker, Practical IT Security and Digital Forensics techniques, Secure South West, Plymouth, 20th September 2012
  • Invited Presentation, "Endpoint Security Case Study", Enterprise Security 2007, London, 11 October 2007
  • Invited Lecturer, IPICS Summer School, Leuven, Belgium, July 2006
  • Presentation, "Online Peer Assessment", Vice-Chancellor's Teaching and Learning Conference, Plymouth, June 2006
  • Keynote Speech, "Transparent User Authentication using Keystroke Analysis", 11th Conference on Human Computer Interaction, Oviedo, Spain, 22-24 March 2006
  • “Common Failings” and "Technical Requirements", Information Systems Security 1 Day Conference, Guernsey, 8 February 2006
  • Invited Lecturer, IPICS Winter School, Oulu, Finland, April 2004
  • Invited Lecturer, Guernsey Training Agency, Guernsey, December 2003, January 2004
  • Invited Lecturer, IPICS Summer School, Malaga, Spain, July 2003
  • Invited Lecturer, IPICS Winter School, Oulu, Finland, April 2003
  • Invited Lecturer, IPICS Summer School, Samos, Greece, July 2002

Other professional/academic activities/roles/duties

  • Academic Regulations Sub-Committee - Faculty Representative (201-2016)
  • Associate Head of School for Computing (2015-2016)
  • Cisco Academy Co-ordinator (2005-2016)
  • CNET Subject Group Leader (2002-2015)
  • Computer Security Incident Response Team member (2015-2016)
  • Data Centre Project Board member (2015-2016)
  • DLE Early Adopter - School Representative (2014-2015)
  • DLE User Group - Academic Representative (2015-2016)
  • DTC Committee Member - CSCAN Representative (2014-2016)
  • Enterprise Architecture Board - Academic Representative (2013-2016)
  • Faculty IT Committee - School Representative (2014-2016)
  • Faculty Plagiarism Committee - (2002-2016)
  • Fitness to Study Hearing - Chair (2014-2016)
  • HR Self Service Working Group - Academic Representative (2009-2010)
  • Industrial Liaison Advisory Committee (2009-2012)
  • Information Security Group (2015-2016)
  • Information Security Policy - Contributor (2012-2014)
  • League Table Performance Committee - S3 Representative (2015-2016)
  • Microsoft Server 2003 Migration Project Board - Academic Representative (2015-2016)
  • Research Student Data Project (2012)
  • School Executive (2009-2016)
  • School Health and Safety Committee (2015-2016)
  • SciTech Showcase - School Coordinator (2012-2016)
  • Student Marks Project Board (2011-2013)
  • Teaching Learning and Quality Committee (2011-2016)
  • University IT Committee (2015-2016)
  • Web Expenses Process Group (2009-2010)