Dr Paul Haskell-Dowland

Dr Paul Haskell-Dowland

Visiting Specialist

Technology & Information Services


Associate Head (Computing)
Member of the Centre for Security, Communications and Network Research (CSCAN)

Further information relating to research publications, professional activities, presentations and conferences organised etc., can be found at the Centre for Security, Communications and Network Research (CSCAN) website.

Key publications are highlighted

Li F, Clarke N, Papadaki M & Dowland P 2011 'Misuse detection for mobile devices using behaviour profiling' International Journal of Cyber Warfare and Terrorism (IJCWT) 1, 41-53
Jali MZ, Furnell SM & Haskell-Dowland PS 2010 'Assessing image-based authentication techniques in a web-based environment' Information Management & Computer Security 18, (1) 43-53
Sanders B, Furnell S, Dowland P & Atkinson S 2010 'Massively Multi-Player Online Role Playing Games: What’s the Risk?' Journal of Virtual Worlds Research 3,
Sanders BG, Dowland P, Atkinson S, Zahra D, Furnell S & Papadaki M 2010 'Online Addiction: A Cultural Comparison of Privacy Risks in Online Gaming Environments' JMPT 1, 181-193
Katsabas D, Furnell S & Dowland P 2006 'Evaluation of end-user application security from a usability perspective'
DOWLAND P 2006 'Security management, integrity & internal control in information systems,(IFIP Int. Federation for information processing, Vol. 193)'
Alayed A, Furnell SM, Zhao D & Dowland PS 2005 'An automated framework for managing security vulnerabilities' Information Management & Computer Security 13, (2) 156-166
Katsabas D, Furnell S & Dowland P 2005 'Using Human Computer Interaction principles to promote usable security'
Furnell SM, Papadopoulos I & Dowland PS 2004 'A long-term trial of alternative user authentication technologies' Information Management and Computer Security 12, (2) 178-190
Clarke N, Dowland P, Furnell S, Reynolds P & Rodwell P 2002 'Non-Intrusive Biometric Authentication for Mobile Devices' Department of Communication and Electronic Engineering, University of Plymouth, UK, URL: http://ted. see. plym. ac. uk/nrg/presentations/Biometrics_2002. pdf 3,
Furnell SM, Gennatou M & Dowland PS 2002 'A prototype tool for information security awareness and training' International Journal of Logisitics Information Management 15, (5) 352-357
Irakleous I, Furnell SM, Dowland PS & Papadaki M 2002 'An experimental comparison of secret-based user authentication technologies' Information Management & Computer Security 10, (3) 100-108
Dowland PS, Papadaki M & Papadaki M 2002 'Keystroke analysis as a method of advanced user authentication and response' Security in the Information Society: Visions and Perspectives 86, 215-226
Furnell SM, Chiliarchaki P & Dowland PS 2001 'Security analysers: Administrator Assistants or Hacker Helpers?' Information Management and Computer Security 9, (2) 93-101
Furnell SM & Dowland PS 2000 'A conceptual architecture for real-time intrusion monitoring' Information Management & Computer Security 8, 65-75
Furnell SM, Dowland PS, Illingworth HM & Reynolds PL 2000 'Authentication and supervision: A survey of user attitudes' Computers & Security 19, 529-539
Dowland PS, Furnell SM, Illingworth HM & Reynolds PL 1999 'Computer crime and abuse: A survey of public attitudes and awareness' Computers & Security 18, 715-726
Furnell SM, Dowland PS & Sanders PW 1999 'Dissecting the “hacker manifesto”' Information management & computer security 7, 69-75
Furnell S & Dowland P 2010 E-mail Security: A Pocket Guide. Itgp
Bleimann U, Dowland PS & Furnell S 2007 Proceedings of the Third Collaborative Research Symposium on Security, E-learning, Internet and Networking. University of Plymouth, School Of Computing, Communications And Electronics
Dowland P, Furnell S, Thuraisingham B & Wang XS 2005 Security Management, Integrity, and Internal Control in Information Systems. Springer
Dowland P, Furnell S, Thuraisingham B & Wang XS 2005 Security Management, Integrity, and Internal Control in Information Systems: IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference. Springer 193
Conference Papers
Li F, Clarke N, Papadaki M & Dowland P 2011 'Behaviour Profiling for Transparent Authentication for Mobile Devices' 307-314
2011 'End-user perception and usability of information security' 97-107
Jali MZ, Furnell SM & Dowland PS 2011 'Multifactor graphical passwords: An assessment of end-user performance' 7-12
Jali M, Furnell S & Dowland P 2011 'Quantifying the Effect of Graphical Password Guidelines for Better Security' 80-91
Dorigo M, Harriehausen-Muehlbauer B, Stengel I & Dowland PS 2011 'Survey: Improving Document Accessibility from the Blind and Visually Impaired User's Point of View' 129-135
Jali MZ, Furnell SM & Dowland PS 2010 'Assessing image-based authentication techniques in a web-based environment' Emerald Group Publishing Limited 43-53
Sanders BG, Dowland PS & Furnell SM 2010 'Implications and Risks of MMORPG Addiction: Motivations, Emotional Investment, Problematic Usage and Personal Privacy' 61-73
Sanders BG, Chen V, Zahra D, Dowland P, Atkinson S, Papadaki M & Furnell S 2010 'Online addiction: privacy risks in online gaming environments' Chbeir R ACM 114-121 Publisher Site
Sanders BG, Dowland PS & Furnell S 2009 'An Assessment of People’s Vulnerabilities in Relation to Personal and Sensitive Data' Lulu. com 50-50
Jali MZ, Furnell S & Dowland PS 2009 'Evaluating Web-Based User Authentication using Graphical Techniques' Lulu. com 108-108
Furnell SM, Katsabas D, Dowland PS & Reid F 2007 'A practical usability evaluation of security features in end-user applications' 205-216
Furnell S, Katsabas D, Dowland P & Reid F 2007 'A Practical Usability Evaluation of Security Features in End-User Applications' Venter HS; Eloff MM; Labuschagne L; Eloff JHP; Solms RV Springer 205-216 Publisher Site
Furnell S, Jusoh A, Katsabas D & Dowland P 2006 'Considering the Usability of End-User Security Software' Fischer-Hübner S; Rannenberg K; Yngström L; Lindskog S Springer 307-316 Publisher Site
Furnell S, Jusoh A, Katsabas D & Dowland P 2006 'Considering the usability of end-user security software' 307-316
Furnell SM & Dowland PS 2006 'Proceedings of the 6th International Network Conference (INC 2006)' University of Plymouth
Charruau D, Furnell S & Dowland P 2005 'ISOneWorld 2005 Conference and Convention, Enabling Executive IS Competencies, Las Vegas, Nevada, USA, 2005 30 March–1 April CD ROM ISBN: 0-9729562-6-3' Elsevier 478-481
Charrau D, Furnell SM & Dowland PS 2005 'PassImages: An alternative method of user authentication'
Furnell SM, Dowland PS & Kormentzas G 2005 'Proceedings of the 5th International Network Conference (INC 2005)' University of the Aegean & University of Plymouth
Dowland P & Furnell S 2004 'A Long-term Trial of Keystroke Profiling using Digraph, Trigraph and Keyword Latencies' Deswarte Y; Cuppens F; Jajodia S; Wang L Kluwer / Springer 275-290 Publisher Site
Dowland PS & Furnell SM 2004 'A long-term trial of keystroke profiling using digraph, trigraph and keyword latencies' 275-289
Furnell SM & Dowland PS 2004 'Proceedings of the 4th International Network Conference (INC 2004)' University of Plymouth
Finch J, Furnell S & Dowland P 2003 'Assessing IT security culture: system administrator and end-user perspectives'
Furnell S, Warren AG & Dowland P 2003 'Improving Security Awareness Through Computer-based Training' Irvine CE; Armstrong HL Kluwer 287-301 Publisher Site
Furnell SM, Warren AG & Dowland PS 2003 'Improving security awareness through computer-based training' 287-301
Furnell S, Alayed A, Barlow IM & Dowland PS 2002 'Critical Awareness - The problem of monitoring security vulnerabilities' Hutchinson B MCIL 85-91
Dowland P, Furnell S & Papadaki M 2002 'Keystroke Analysis as a Method of Advanced User Authentication and Response' Ghonaimy A; El-Hadidi MT; Aslan HK Kluwer 215-226 Publisher Site
Furnell SM & Dowland PS 2002 'Proceedings of the Third International Network Conference'
Furnell SM, Magklaras GB, Papadaki M & Dowland PS 2001 'A generic taxonomy for intrusion specification and response'
Dowland P, Singh H & Furnell S 2001 'A preliminary investigation of user authentication using continuous keystroke analysis'
Singh H, Furnell S, Lines B & Dowland P 2001 'Investigating and Evaluating Behavioural Profiling and Intrusion Detection Using Data Mining' Gorodetski VI; Skormin VA; Popyack LJ Springer 153-158 Publisher Site
Singh H, Furnell S, Lines B & Dowland P 2001 'Investigating and evaluating behavioural profiling and intrusion detection using data mining' 153-158
Furnell SM, Gennatou M & Dowland PS 2000 'Promoting security awareness and training within small organisations'
Singh H, Furnell SM, Dowland PS, Lines B & Kaur S 0 'A Correlation Framework for Continuous User Authentication Using Data Mining' Proceedings of the Fourth International Network Conference (INC 2004), Plymouth, UK 06/07/2004 09/07/2004 237-245
Dowland P 0 'Home Page'
Swientek M, Bleimann U & Dowland PS 0 'Service-Oriented Architecture: Performance Issues and Approaches' Lulu. com 261-261
Other Publications
Zhang R & Dowland PS 0 A guide for small and medium enterprise of implementing security and firewall system. Lulu. com 0 0
0 Gridded database browser of North Sea plankton: fifty years (1948–1997) of monthly plankton abundance from the continuous plankton recorder (CPR) survey [CD-ROM]. 0 0
Bali R & Dowland PS 0 Implementing a network operations centre management console: Netmates. Lulu. com 0 0
Asiwe VC & Dowland PS 0 Implementing Network Monitoring Tools. Lulu. com 0 0
Al-Ghatam H & Dowland PS 0 Information Security Awareness & Training. Lulu. com 0 0
Feroz S & Dowland PS 0 Security and Risk Analysis of VoIP Networks. Lulu. com 0 0
Mohyuddin A & Dowland PS 0 The Art of Network Monitoring. Lulu. com 0 0
Dowland PS 0 User authentication and supervision in networked systems. 0 0
Rizvi SMA & Dowland PS 0 VoIP Security Threats and Vulnerabilities. Lulu. com 0 0
Aung TY & Dowland PS 0 Web-based Plankton Data Visualisation. Lulu. com 0 0