Professor Debi Ashenden
School of Computer and Mathematical Sciences
Faculty of Sciences, Engineering and Technology
Eligible to supervise Masters and PhD - email supervisor to discuss availability.
Debi holds the DST Group-University of Adelaide Chair in Cybersecurity. In addition, she is Professor of Cyber Security at the University of Portsmouth and a visiting Professor at Royal Holloway, University of London. Debi’s research interests are in the social and behavioural aspects of cybersecurity – particularly in finding ways of ‘patching with people’ as well as technology. She is currently researching transdisciplinary approaches to modelling complex warfighting, how to fuse behavioural science with cyber deception, and the socio-technical aspects of designing complex military systems.
Debi was previously Head of the Centre for Cyber Security at Cranfield University at the Defence Academy of the UK and was a member of the UK MOD’s Defence Science Expert Committee. She has worked extensively across the public and private sector for organisations such as UK MOD, GCHQ, Cabinet Office, Home Office, Euroclear, Prudential, Barclaycard, Reuters and Close Bros. She has had a number of articles on cyber security published, presented at a range of conferences and co-authored a book for Butterworth Heinemann, Risk Management for Computer Security: Protecting Your Network & Information Assets.
Date Position Institution name 2016 - ongoing Professor of Cyber Security University of Portsmouth
Date Institution name Country Title University College London United Kingdom PhD University of Warwick United Kingdom MBA University of Birmingham United Kingdom MSc Computer Science University of Leicester United Kingdom MA Victorian Literature University of Worcester United Kingdom BA (Hons)
Year Citation 2020 Coles-Kemp, L., Ashenden, D., Morris, A., & Yuille, J. (2020). Digital welfare: designing for more nuanced forms of access. Policy Design and Practice, 3(2), 177-188.
2018 Ashenden, D. (2018). In their own words: employee attitudes towards information security. Information and Computer Security, 26(3), 327-337.
2018 Coles-Kemp, L., Ashenden, D., & O’Hara, K. (2018). Why should I? Cybersecurity, the security of the state and the insecurity of the citizen. Politics and Governance, 6(2), 41-48.
DOI Scopus20 WoS14
2016 Ashenden, D., & Lawrence, D. (2016). Security Dialogues: Building Better Relationships between Security and Business. IEEE Security and Privacy, 14(3), 82-87.
DOI Scopus28 WoS16
2016 Ashenden, D. (2016). With cyber attacks set to rise, it's important that we empower employees to defend our front line. TCE The Chemical Engineer, (896), 22-25.
2015 Barnard-Wills, D., & Ashenden, D. (2015). Playing with Privacy: Games for Education and Communication in the Politics of Online Privacy. Political Studies, 63(1), 142-160.
DOI Scopus11 WoS11
2013 Ashenden, D., & Sasse, A. (2013). CISOs and organisational culture: Their own worst enemy?. Computers and Security, 39(PART B), 396-405.
DOI Scopus43 WoS29
2012 Barnard-Wills, D., & Ashenden, D. (2012). Securing virtual space: Cyber war, cyber terror, and risk. Space and Culture, 15(2), 110-123.
DOI Scopus32 WoS31
2008 Ashenden, D. (2008). Information Security management: A human challenge?. Information Security Technical Report, 13(4), 195-201.
2005 Ashenden, D. (2005). Looking out into a world of threat. Computer Fraud and Security, 2005(3), 13-15.
2003 Ashenden, D. (2003). Protect and survive. Telecommunications International, 37(1), 29-31.
Year Citation 2017 Coles-Kemp, L., & Ashenden, D. (2017). ‘AN EVERYDAY STORY OF COUNTRY FOLK’ ONLINE? THE MARGINALISATION OF THE INTERNET AND SOCIAL MEDIA IN THE ARCHERS. In C. Courage, & N. Headlam (Eds.), Custard, Culverts and Cake: Academics on Life in The Archers (pp. 249-267). Bingley, United Kingdom: Emerald Publishing Limited.
Year Citation 2022 Ashenden, D., Ollis, G., & Reid, I. (2022). Dancing, not Wrestling: Moving from Compliance to Concordance for Secure Software Development. In ACM International Conference Proceeding Series. ACM.
2021 Ashenden, D., Black, R., Reid, I., & Henderson, S. (2021). Design thinking for cyber deception. In Proceedings of the 54th Hawaii International Conference on System Sciences (HICSS 2021) Vol. 2020-January (pp. 1958-1967). online: ScholarSpace.
2020 Ashenden, D., & Ollis, G. (2020). Putting the Sec in DevSecOps: Using Social Practice Theory to Improve Secure Software Development. In ACM International Conference Proceeding Series (pp. 34-44). online: ACM.
2017 Ashenden, D. (2017). What Do They Really Think? Overcoming Social Acceptability Bias in Information Security Research.. In S. Furnell, & N. L. Clarke (Eds.), Eleventh International Symposium on Human Aspects of Information Security & Assurance (HAISA 2017) (pp. 251-260). online: University of Plymouth. 2013 Ashenden, D., & Lawrence, D. (2013). Can we sell security like soap? A new approach to behaviour change. In M. E. Zurko, K. Beznosov, T. Whalen, & T. Longstaff (Eds.), ACM International Conference Proceeding Series (pp. 87-94). Banff, CANADA: ASSOC COMPUTING MACHINERY.
DOI Scopus13 WoS12
2011 Ashenden, D. (2011). Cyber security: Time for engagement and debate. In R. Ottis (Ed.), 10th European Conference on Information Warfare and Security 2011, ECIW 2011 (pp. 11-16). Tallinn Univ Technol, Inst Cybernet (IoC), Tallinn, ESTONIA: ACADEMIC CONFERENCES LTD.
2011 Coopamootoo, P. L., & Ashenden, D. (2011). Designing usable online privacy mechanisms: What can we learn from real world behaviour?. In S. FischerHubner, P. Duquenoy, M. Hansen, R. Leenes, & G. Zhang (Eds.), IFIP Advances in Information and Communication Technology Vol. 352 AICT (pp. 311-324). Helsingborg, SWEDEN: SPRINGER-VERLAG BERLIN.
DOI Scopus7 WoS5
2011 Coopamootoo, P. L., & Ashenden, D. (2011). A systematic evaluation of the communicability of online privacy mechanisms with respect to communication privacy management. In A. Marcus (Ed.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 6770 LNCS (pp. 384-393). Orlando, FL: SPRINGER-VERLAG BERLIN.
DOI Scopus2 WoS2
2005 Ashenden, D. (2005). Governance principles for sharing information in the Network Enabled Capability (NEC) Environment. In 4th European Conference on Information Warfare and Security 2005, ECIW 2005 (pp. 1-7).
Year Citation 2018 Bella, G., Lenzini, G., Tryfonas, T., & Ashenden, D. (Eds.) (2018). STAST 2018: 8th International Workshop on Socio-Technical Aspects in Security and Trust, San Juan, Puerto Rico, USA, December, 2018. Poster session presented at the meeting of STAST. ACM. 2018 Tryfonas, T., & Ashenden, D. (2018). Foreword from the Programme Chairs. Poster session presented at the meeting of ACM International Conference Proceeding Series.
Current Higher Degree by Research Supervision (University of Adelaide)
Date Role Research Topic Program Degree Type Student Load Student Name 2023 Principal Supervisor Understanding factors impacting the use of deception technology when used for defensive cyber operations. Doctor of Philosophy Doctorate Part Time Mr Rich Munslow
Connect With Me