PhD Students
Completed Students
Wajdan Abdullah A Al Malwi (2nd Supervisor) | Beyond the Privacy Paradox: A Cross-Cultural Study of Users’ Privacy-Related Decisions in the Social Networking Context |
Juraj Sikra (2nd Supervisor) | Cybercrime reporting |
EYA, NWANNEKA GETHRUDE: The role of human factors in enterprise security | |
Amel Attatfa | Cyber Diplomacy: Diplomatic Action in International Relations on Cyberspace |
Saad Alahmari Organizational Security (2nd Supervisor) | A model for describing and encouraging cyber security knowledge sharing to enhance awareness. |
Saad Nasser Altamimi (2nd Supervisor) | Investigating and mitigating the role of neutralisation techniques on information security policies violation in healthcare organisations. |
Noura Aleisa | THE IMPACT OF THE ADOPTION OF INTERNET OF THINGS PRIVACY-AWARENESS MODEL IN SAUDI ARABIA: AN EXPERIMENTAL STUDY |
Maryam Al Awadi | A Study of Employees’ Attitudes Towards Organisational Information Security Policies in the UK and Oman |
Mohamed Al Fairuz | An Investigation into the Usability and Acceptability of Multi-channel Authentication to Online Banking Users in Oman |
Nora Alkaldi | Adopting Password Manager Applications among Smartphone Users |
Ahmed Alzahrani (2nd Supervisor) | Measuring the impact of intrinsic motivation on information security policy compliance. |
Huda Al Shuaily | SQL pattern design, development & evaluation of its efficacy |
Thiam Kian Chiew | Web Page Performance Analysis |
Heather Crawford | A framework for continuous, transparent authentication on mobile devices |
Iain Darroch | Drag and Drop Graphical Interface for Constructing Chains to support Biological Research |
Stevie Docherty (2nd Supervisor) | Investigating the Use of Social Media in Disturbances |
Rosanne English (2nd Supervisor) | Modelling the security of recognition-based graphical password schemes |
Takudzwa Mutyavaviri | Masters: Rhodes University | Dora Galvez-Cruz | An Environment for Protecting the Privacy of E-Shoppers |
Ying He (2nd Supervisor) | Generic security templates for information system security arguments: mapping security arguments within healthcare systems |
Salem Jebriel (2nd Supervisor) | Empirical approach towards investigating usability, guessability and social factors affecting graphical based passwords security. |
Joseph Maguire | An ecologically valid evaluation of an observation-resilient graphical authentication mechanism |
Robbie Simpson (2nd Supervisor) | Formalised responsibility modelling for automated socio-technical systems analysis. |
Tim Troup | A Framework to Enable User Directed Component Binding at Runtime |
Current Students
- Siti Suraya Binti Mohamad: Cybersecurity Education
- Chelsea Jarvie: Age Verification (Article in WSJ about Chelsea’s research)
- Rawan Alharthi – AI Deployment
- Mona Kherees: Privacy in Tourism
- Rufai Ahmed (2nd Supervisor): The security of SCADA systems.It aims to come up with an effective framework for managing and improving SCADA systems cybersecurity.
- UMEASIEGBU, TOCHUKWU (2nd Supervisor): An ethics and privacy framework for the internet of things
- Maria Lamond (External Supervisor): Educating Children about Cybersecurity (Abertay)
- Christopher Barhorst(External Supervisor): Trust (Glasgow)
- Shehani Pigera (External Supervisor): Contact Tracing (Teesside)
Masters Students
- (2020) Tool for those who Abscond
- (2020) KidzPass Authentication Mechanism
- (2020) Quantifying Privacy Loss as a consequence of lost removable storage media
- (2019) What do people leave on the USBs when they sell them?
- (2018) What Security Practices do People Engage in?
- (2017) A qualitative study on how organisations respond to data breaches
- (2017) Cyber Culture and Cyber Security Policy of Indonesia
- (2014/15) iPhone Podcasting App for the Blind
- (2014/15) iPhone Podcasting App for the Blind
- (2013/14) An online age verification scheme
- (2013/14) Digital Profiling and Threat Analysis
- (2013/14) The Chasm of Perplexity
- (2013/14) Mobile Phone Interface for the Elderly
- (2012/13) Pattern-based Software Architecture Design Framework
- (2011/12) CAPTCHAs for the Blind
- (2011/12) Training program for securing against social engineers
- (2011/12) Simulation Visualisation
- (2010/11) Tailorable Graphical Authentication
- (2010/11) Moodle Authentication
- (2010/11) Game to train people to spot phishing messages
- (2010/11) Lectures in the Lab
- (2010/11) Structured Store of Information Security Policies
- (2007/08) Alternative Authentication
- (2007/08) Rockvale Rebound Website
- (2006/07) Textual Associations from images applied to authentication
- (2004/05) Authentication by Handwriting Recognition
Bachelors Students
- (2018/2019) An Evaluation of Graphical Passwords as an Alternative Authentication Method for Children
- (2014/15) Security Awareness (Darmstadt)
- (2014/15) Help Me Remember My PIN
- (2014/15) Password Generation
- (2014/15) What’s your Privacy Quotient?
- (2014/15) Media Database Project
- (2013/14) The Daily Record
- (2013/14) TRACKER: Trauma ReCord KEeping
- (2013/14) MailGorilla: No-Cost Promotional Emailing
- (2013/14) Shoulder Surfing resistance (Darmstadt)
- (2012/13) HandiVote mobile application for referendums on economic decisions
- (2011/12) Musical Cues
- (2011/12) Training Programme for Securing Against Social Engineers
- (2011/12) Website for a Translator (Level 3 Project)
- (2010/11) CuePic
- (2008/09) Accessible CAPTCHAs
- (2008/09) Password Protection
- (2008/09) Security Games (Level 3 Project)
- (2007/08) Exploring the ENRON Email Corpus
- (2007/08) Alternative Authentication
- (2007/08) Take Your Medicine
- (2007/08) Email Client
- (2006/07) PDA Authentication
- (2006/07) Online Homework System (Level 3 Project)
- (2005/06) Email Software
- (2005/06) Alternative Authentication
- (2005/06) Questionnaire Software
- (2005/06) A Personalised Virtual Grocery Store (Level 3 Project)
- (2003/04) Colour and Memorability in Web Pages
- (2003/04) Alternative Authentication
- (2003/04) A GUI for the Unix Stream Editor (sed)
- (2002/03) Associative Authentication
Teaching
- Human-Centred Security
- Engineering Resilient Systems
- IT Architectures
- Human-Centred Security (UWC-2013)
- Human-Centred Security Experimentation (2014) (Darmstadt)
- Communication and Awareness Aspects in Companies (2015) (Darmstadt)
Previous Teaching
- Enterprise Computing
- Databases & SQL
- Programming (Java, LISP, C++, PHP)
- Information Management
- Internet Technology
- C++ & LISP Programming
- Pascal Programming