Dr Paul Haskell-Dowland
Profiles

Dr Paul Haskell-Dowland

Visiting Specialist

Technology & Information Services (NC)

Role

Associate Head (Computing)
Member of the Centre for Security, Communications and Network Research (CSCAN)

Further information relating to research publications, professional activities, presentations and conferences organised etc., can be found at the Centre for Security, Communications and Network Research (CSCAN) website.

Key publications are highlighted

Journals
Articles
Li F, Clarke N, Papadaki M & Dowland P 2011 'Misuse detection for mobile devices using behaviour profiling' International Journal of Cyber Warfare and Terrorism (IJCWT) 1, 41-53
Jali MZ, Furnell SM & Haskell-Dowland PS 2010 'Assessing image-based authentication techniques in a web-based environment' Information Management & Computer Security 18, (1) 43-53
Sanders B, Furnell S, Dowland P & Atkinson S 2010 'Massively Multi-Player Online Role Playing Games: What’s the Risk?' Journal of Virtual Worlds Research 3,
Clarke N & Dowland PS 2009 'A CRITICAL EVALUATION OF OPAS (ONLINE PEER ASSESSMENT SYSTEM)' ICERI2009 Proceedings 5124-5135
Katsabas D, Furnell S & Dowland P 2006 'Evaluation of end-user application security from a usability perspective'
DOWLAND P 2006 'Security management, integrity & internal control in information systems,(IFIP Int. Federation for information processing, Vol. 193)'
Alayed A, Furnell SM, Zhao D & Dowland PS 2005 'An automated framework for managing security vulnerabilities' Information Management & Computer Security 13, (2) 156-166
Katsabas D, Furnell S & Dowland P 2005 'Using Human Computer Interaction principles to promote usable security'
Furnell SM, Papadopoulos I & Dowland PS 2004 'A long-term trial of alternative user authentication technologies' Information Management and Computer Security 12, (2) 178-190
Furnell SM, Gennatou M & Dowland PS 2002 'A prototype tool for information security awareness and training' International Journal of Logisitics Information Management 15, (5) 352-357
Irakleous I, Furnell SM, Dowland PS & Papadaki M 2002 'An experimental comparison of secret-based user authentication technologies' Information Management & Computer Security 10, (3) 100-108
Dowland PS, Papadaki M & Papadaki M 2002 'Keystroke analysis as a method of advanced user authentication and response' Security in the Information Society: Visions and Perspectives 86, 215-226
Clarke N, Dowland P, Furnell S, Reynolds P & Rodwell P 2002 'Non-Intrusive Biometric Authentication for Mobile Devices' Department of Communication and Electronic Engineering, University of Plymouth, UK, URL: http://ted. see. plym. ac. uk/nrg/presentations/Biometrics_2002. pdf 3,
Furnell SM, Chiliarchaki P & Dowland PS 2001 'Security analysers: Administrator Assistants or Hacker Helpers?' Information Management and Computer Security 9, (2) 93-101
Furnell SM & Dowland PS 2000 'A conceptual architecture for real-time intrusion monitoring' Information Management & Computer Security 8, 65-75
Furnell SM, Dowland PS, Illingworth HM & Reynolds PL 2000 'Authentication and supervision: A survey of user attitudes' Computers & Security 19, 529-539
Dowland PS, Furnell SM, Illingworth HM & Reynolds PL 1999 'Computer crime and abuse: A survey of public attitudes and awareness' Computers & Security 18, 715-726
Furnell SM, Dowland PS & Sanders PW 1999 'Dissecting the “hacker manifesto”' Information management & computer security 7, 69-75
Books
Furnell S & Dowland P 2010 E-mail Security: A Pocket Guide. Itgp
Dowland P, Furnell S, Thuraisingham B & Wang XS 2005 Security Management, Integrity, and Internal Control in Information Systems. Springer
Dowland P, Furnell S, Thuraisingham B & Wang XS 2005 Security Management, Integrity, and Internal Control in Information Systems: IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference. Springer 193
Chapters
Dowland P 0 'Home Page'
Scholarly Editions
Bleimann U, Dowland PS & Furnell S 2007 Proceedings of the Third Collaborative Research Symposium on Security, E-learning, Internet and Networking. University of Plymouth, School Of Computing, Communications And Electronics
Zhang R & Dowland PS 0 A guide for small and medium enterprise of implementing security and firewall system. Lulu. com
Bali R & Dowland PS 0 Implementing a network operations centre management console: Netmates. Lulu. com
Asiwe VC & Dowland PS 0 Implementing Network Monitoring Tools. Lulu. com
Al-Ghatam H & Dowland PS 0 Information Security Awareness & Training. Lulu. com
Feroz S & Dowland PS 0 Security and Risk Analysis of VoIP Networks. Lulu. com
Mohyuddin A & Dowland PS 0 The Art of Network Monitoring. Lulu. com
Rizvi SMA & Dowland PS 0 VoIP Security Threats and Vulnerabilities. Lulu. com
Aung TY & Dowland PS 0 Web-based Plankton Data Visualisation. Lulu. com
Conference Papers
Li F, Clarke N, Papadaki M & Dowland P 2011 'Behaviour Profiling for Transparent Authentication for Mobile Devices' //0 //0 307-314
Zaaba ZF, Furnell SM & Dowland PS 2011 'End-user perception and usability of information security' //0 //0 97-107
Jali MZ, Furnell SM & Dowland PS 2011 'Multifactor graphical passwords: An assessment of end-user performance' //0 //0 7-12
Jali M, Furnell S & Dowland P 2011 'Quantifying the Effect of Graphical Password Guidelines for Better Security' //0 //0 80-91
Dorigo M, Harriehausen-Muehlbauer B, Stengel I & Dowland PS 2011 'Survey: Improving Document Accessibility from the Blind and Visually Impaired User's Point of View' //0 //0 129-135
Jali MZ, Furnell SM & Dowland PS 2010 'Assessing image-based authentication techniques in a web-based environment' //0 //0 Emerald Group Publishing Limited 43-53
Sanders BG, Dowland PS & Furnell SM 2010 'Implications and Risks of MMORPG Addiction: Motivations, Emotional Investment, Problematic Usage and Personal Privacy' //0 //0 61-73
Sanders B, Chen V, Zahra D, Dowland P, Atkinson S, Papadaki M & Furnell S 2010 'Online addiction: privacy risks in online gaming environments' //0 //0 114-121
Sanders BG, Dowland PS & Furnell S 2009 'An Assessment of People’s Vulnerabilities in Relation to Personal and Sensitive Data' //0 //0 Lulu. com 50-50
Jali MZ, Furnell S & Dowland PS 2009 'Evaluating Web-Based User Authentication using Graphical Techniques' //0 //0 Lulu. com 108-108
Furnell SM, Katsabas D, Dowland PS & Reid F 2007 'A practical usability evaluation of security features in end-user applications' //0 //0 205-216
Furnell S, Katsabas D, Dowland P & Reid F 2007 'A practical usability evaluation of security features in end-user applications' //0 //0 Springer 205-216
Furnell S, Jusoh A, Katsabas D & Dowland P 2006 'Considering the usability of end-user security software' //0 //0 Springer 307-316
Furnell S, Jusoh A, Katsabas D & Dowland P 2006 'Considering the usability of end-user security software' //0 //0 307-316
Furnell SM & Dowland PS 2006 'Proceedings of the 6th International Network Conference (INC 2006)' University of Plymouth //0 //0
Charruau D, Furnell S & Dowland P 2005 'ISOneWorld 2005 Conference and Convention, Enabling Executive IS Competencies, Las Vegas, Nevada, USA, 2005 30 March–1 April CD ROM ISBN: 0-9729562-6-3' //0 //0 Elsevier 478-481
Charrau D, Furnell SM & Dowland PS 2005 'PassImages: An alternative method of user authentication' //0 //0
Furnell SM, Dowland PS & Kormentzas G 2005 'Proceedings of the 5th International Network Conference (INC 2005)' University of the Aegean & University of Plymouth //0 //0
Dowland P & Furnell S 2004 'A long-term trial of keystroke profiling using digraph, trigraph and keyword latencies' //0 //0 Springer 275-289
Dowland PS & Furnell SM 2004 'A long-term trial of keystroke profiling using digraph, trigraph and keyword latencies' //0 //0 275-289
Furnell SM & Dowland PS 2004 'Proceedings of the 4th International Network Conference (INC 2004)' University of Plymouth //0 //0
Finch J, Furnell S & Dowland P 2003 'Assessing IT security culture: system administrator and end-user perspectives' //0 //0
Fumell SM, Warren AG & Dowland PS 2003 'Improving security awareness through computer-based training' //0 //0 Springer 287-287
Furnell SM, Warren AG & Dowland PS 2003 'Improving security awareness through computer-based training' //0 //0 287-301
Furnell S, Alayed A, Barlow IM & Dowland PS 2002 'Critical Awareness - The problem of monitoring security vulnerabilities' Hutchinson B //0 //0 MCIL 85-91
Dowland P, Furnell S & Papadaki M 2002 'Keystroke analysis as a method of advanced user authentication and response' //0 //0 Kluwer, BV 215-226
Furnell SM & Dowland PS 2002 'Proceedings of the Third International Network Conference' //0 //0
Furnell SM, Magklaras GB, Papadaki M & Dowland PS 2001 'A generic taxonomy for intrusion specification and response' //0 //0
Dowland P, Singh H & Furnell S 2001 'A preliminary investigation of user authentication using continuous keystroke analysis' //0 //0
Singh H, Furnell S, Lines B & Dowland P 2001 'Investigating and evaluating behavioural profiling and Intrusion Detection using data Mining' //0 //0 Springer 153-158
Singh H, Furnell S, Lines B & Dowland P 2001 'Investigating and evaluating behavioural profiling and intrusion detection using data mining' //0 //0 153-158
Furnell SM, Gennatou M & Dowland PS 2000 'Promoting security awareness and training within small organisations' //0 //0
Singh H, Furnell SM, Dowland PS, Lines B & Kaur S 0 'A Correlation Framework for Continuous User Authentication Using Data Mining' Proceedings of the Fourth International Network Conference (INC 2004), Plymouth, UK 06/07/2004 09/07/2004 237-245
Swientek M, Bleimann U & Dowland PS 0 'Service-Oriented Architecture: Performance Issues and Approaches' //0 //0 Lulu. com 261-261