Teaching

PhD Students

Completed Students

Wajdan Abdullah A Al Malwi (2nd Supervisor)Beyond the Privacy Paradox: A Cross-Cultural Study of Users’ Privacy-Related Decisions in the Social Networking Context
Amel AttatfaCyber Diplomacy: Diplomatic Action in International Relations on Cyberspace
Saad Alahmari Organizational Security (2nd Supervisor) A model for describing and encouraging cyber security knowledge sharing to enhance awareness.
Saad Nasser Altamimi (2nd Supervisor) Investigating and mitigating the role of neutralisation techniques on information security policies violation in healthcare organisations.
Noura AleisaTHE IMPACT OF THE ADOPTION OF INTERNET OF THINGS PRIVACY-AWARENESS MODEL IN SAUDI ARABIA: AN EXPERIMENTAL STUDY
Maryam Al AwadiA Study of Employees’ Attitudes Towards Organisational Information Security Policies in the UK and Oman
Mohamed Al FairuzAn Investigation into the Usability and Acceptability of Multi-channel Authentication to Online Banking Users in Oman
Nora AlkaldiAdopting Password Manager Applications among Smartphone Users
Ahmed Alzahrani (2nd Supervisor)Measuring the impact of intrinsic motivation on information security policy compliance.
Huda Al ShuailySQL pattern design, development & evaluation of its efficacy
Thiam Kian ChiewWeb Page Performance Analysis
Heather CrawfordA framework for continuous, transparent authentication on mobile devices
Iain DarrochDrag and Drop Graphical Interface for Constructing Chains to support Biological Research
Stevie Docherty (2nd Supervisor)Investigating the Use of Social Media in Disturbances
Rosanne English (2nd Supervisor)Modelling the security of recognition-based graphical password schemes
Takudzwa MutyavaviriMasters: Rhodes University
Dora Galvez-CruzAn Environment for Protecting the Privacy of E-Shoppers
Ying He (2nd Supervisor)Generic security templates for information system security arguments: mapping security arguments within healthcare systems
Salem Jebriel (2nd Supervisor)Empirical approach towards investigating usability, guessability and social factors affecting graphical based passwords security.
Joseph MaguireAn ecologically valid evaluation of an observation-resilient graphical authentication mechanism
Robbie Simpson (2nd Supervisor)Formalised responsibility modelling for automated socio-technical systems analysis.
Tim TroupA Framework to Enable User Directed Component Binding at Runtime

Current Students

  • Siti Suraya Binti Mohamad: Cybersecurity Education
  • Chelsea Jarvie: Age Verification (Article in WSJ about Chelsea’s research)
  • Mona Kherees: Privacy in Tourism
  • Rufai Ahmed (2nd Supervisor): The security of SCADA systems.It aims to come up with an effective framework for managing and improving SCADA systems cybersecurity. 
  • Juraj Sikra (2nd Supervisor): Cybercrime reporting
  • EYA, NWANNEKA GETHRUDE: The role of human factors in enterprise security
  • UMEASIEGBU, TOCHUKWU (2nd Supervisor): An ethics and privacy framework for the internet of things 
  • Maria Lamond (External Supervisor): Educating Children about Cybersecurity (Abertay)
  • Christopher Barhorst(External Supervisor): Trust (Glasgow)
  • Shehani Pigera (External Supervisor): Contact Tracing (Teesside)

Masters Students

  1. (2020) Tool for those who Abscond
  2. (2020) KidzPass Authentication Mechanism
  3. (2020) Quantifying Privacy Loss as a consequence of lost removable storage media
  4. (2019) What do people leave on the USBs when they sell them?
  5. (2018) What Security Practices do People Engage in?
  6. (2017) A qualitative study on how organisations respond to data breaches
  7. (2017) Cyber Culture and Cyber Security Policy of Indonesia
  8. (2014/15) iPhone Podcasting App for the Blind
  9. (2014/15) iPhone Podcasting App for the Blind
  10. (2013/14) An online age verification scheme
  11. (2013/14) Digital Profiling and Threat Analysis
  12. (2013/14) The Chasm of Perplexity
  13. (2013/14) Mobile Phone Interface for the Elderly
  14. (2012/13) Pattern-based Software Architecture Design Framework
  15. (2011/12) CAPTCHAs for the Blind
  16. (2011/12) Training program for securing against social engineers
  17. (2011/12) Simulation Visualisation
  18. (2010/11) Tailorable Graphical Authentication
  19. (2010/11) Moodle Authentication
  20. (2010/11) Game to train people to spot phishing messages
  21. (2010/11) Lectures in the Lab
  22. (2010/11) Structured Store of Information Security Policies
  23. (2007/08) Alternative Authentication
  24. (2007/08) Rockvale Rebound Website
  25. (2006/07) Textual Associations from images applied to authentication
  26. (2004/05) Authentication by Handwriting Recognition

Bachelors Students

  • (2018/2019) An Evaluation of Graphical Passwords as an Alternative Authentication Method for Children
  • (2014/15) Security Awareness (Darmstadt)
  • (2014/15) Help Me Remember My PIN
  • (2014/15) Password Generation
  • (2014/15) What’s your Privacy Quotient?
  • (2014/15) Media Database Project
  • (2013/14) The Daily Record
  • (2013/14) TRACKER: Trauma ReCord KEeping
  • (2013/14) MailGorilla: No-Cost Promotional Emailing
  • (2013/14) Shoulder Surfing resistance (Darmstadt)
  • (2012/13) HandiVote mobile application for referendums on economic decisions
  • (2011/12) Musical Cues
  • (2011/12) Training Programme for Securing Against Social Engineers
  • (2011/12) Website for a Translator (Level 3 Project)
  • (2010/11) CuePic
  • (2008/09) Accessible CAPTCHAs
  • (2008/09) Password Protection
  • (2008/09) Security Games (Level 3 Project)
  • (2007/08) Exploring the ENRON Email Corpus
  • (2007/08) Alternative Authentication
  • (2007/08) Take Your Medicine
  • (2007/08) Email Client
  • (2006/07) PDA Authentication
  • (2006/07) Online Homework System (Level 3 Project)
  • (2005/06) Email Software
  • (2005/06) Alternative Authentication
  • (2005/06) Questionnaire Software
  • (2005/06) A Personalised Virtual Grocery Store (Level 3 Project)
  • (2003/04) Colour and Memorability in Web Pages
  • (2003/04) Alternative Authentication
  • (2003/04) A GUI for the Unix Stream Editor (sed)
  • (2002/03) Associative Authentication

Teaching

  • Human-Centred Security
  • Engineering Resilient Systems
  • IT Architectures
  • Human-Centred Security (UWC-2013)
  • Human-Centred Security Experimentation (2014) (Darmstadt)
  • Communication and Awareness Aspects in Companies (2015) (Darmstadt)

Previous Teaching

  • Enterprise Computing
  • Databases & SQL
  • Programming (Java, LISP, C++, PHP)
  • Information Management
  • Internet Technology
  • C++ & LISP Programming
  • Pascal Programming