If you made any changes in Pure these will be visible here soon.

Personal profile

Overview

Much of my time is presently occupied with the preparation, delivery and assessment of undergraduate and postgraduate modules in information security and project management.

I also supervise Honours and Masters projects in these and other areas of Information Technology. My outside interests include genealogy, genetics and genetic genealogy.

In the past, I have delivered short courses to industry on behalf of the I.T. Academy, Scottish Wider Access Programme and I.T. Associate Company Scheme in the UK and also abroad.

Prior to working at UWS, I was a researcher at the National Engineering Laboratory and the University of Strathclyde where my interests included software certification and computer integrated manufacturing. I have also spent time on secondment to IBM, testing and configuring remote support applications for banking, and as a visiting lecturer at Beijing Union University.

Area of academic expertise - outline

My main areas of expertise are:

  • Cybersecurity
  • Software Testing
  • System Administration
  • Software Project Management

Current research activities

My current research interests derive from my teaching in information security including: password authentication, the history and application of cryptography and social engineering.

I am also interested in developments in online learning and investigating the correlation, if any, between face-to-face attendance and academic performance.

Desired research direction

I am particularly keen to explore the impact on privacy of increased government surveillance, legislative changes, large public-sector databases, corporate data collection/profiling and the proliferation of smart/connected devices.

In my opinion, there is a need to evaluate and balance the rights of the individual with the benefits to the individual and society (most notably government and law enforcement).

Target collaborative companies

I would like to collaborate with SMEs seeking to identify potential security vulnerabilities and to deploy cost-effective controls. My recommendations would include not just technical countermeasures but also establishing policy as a foundation and setting up tailored training and awareness programmes for staff.

Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

testing Agriculture & Biology