University of East London Homepage


Dr Islam, Shareeful

Contact details

Position: Lecturer and Programme Leader

Location: Knowledge Dock, KD.2.21

Telephone: +44(0)2082237273 Direct Line

Email: shareeful@uel.ac.uk

Contact address:

School of Architecture, Computing and Engineering (ACE),
University of East London,
Docklands Campus,
4-6 University Way,
London E16 2RD.

Brief biography

Dr. Shareeful Islam was awarded his PhD in Software Risk Management Model using goal-driven approach from chair of Software & Systems Engineering (I4), Technische Universität München, Germany. He has received a Postgraduate Certificate on Teaching and Learning in higher
education(PGcert) from the University of East London and a fellow of HE academy.
He has also received M.Sc. degree in Information Communication System Security(ICSS) from the Royal Institute of Technology, Sweden. He also received M.Sc. degree in Computer Science (CS)and B.Sc. (Hon’s) in applied physics and electronics(APE) from the University of Dhaka, Bangladesh. He completed the ISO 9001:2001 lead auditor certification and is a certified quality management system auditor. He has worked as an Assistant Professor at the Institute of Information Technology (IIT), University of Dhaka, Bangladesh. . He has more than 30 publication in well recognized journals and conferences proceedings . His main research interests are in the field of  risk management,cyber crime,   security and privacy. Special interests are risk management model, forensic investigation, security and privacy, requirements engineering, model based development and cloud computing. He is also involved in KTP and EPSRC projects and previously worked in EU project.

 

Return to top

Activities and responsibilities

  • Programme leader B.Sc. in Computing
  • Teaching in BSc and MSc program
  • Supervision and co-supervision of PhD thesis
  • Supervision of M.Sc. and B.Sc. dissertation/projects
  • Collaboration research works with other partner universities such as SBA research Austria, Uppsala University, TU Dortmund and Hannover University
  • Involvement of KTP,KTIP and EPSRC projects

Return to top

Areas of Interest/Summary of Expertise

  • Risk Management Model
  • Security, Privacy, Trust, Cloud computing
  • Cyber Crime and Forensic Investigaion
  • Requirements Engineering, Project management
  • Goal Modelling language
  • Information Security Management System(ISMS), ISO 27001:2005, ISO27002:2005
  • Certified Lead Auditor ISO 9001:2000
  • Please contact with me if you are interested to do any research within my area of interest.

 

 

Return to top

Teaching: Programmes

 

  • Modules in B.Sc./M.Sc. programs
  • Dissertation
  • PhD thesis supervision
  • Distance learning
  • Modules

 

Return to top

Teaching: Modules

Modules:

  • Information Security Management(M.Sc.)
  • Secure Software  Systems Engineering(M.Sc.)
  • Software Engineering(M.Sc.)
  • Security Management(Online)
  • Application Workshop(B.Sc.)
  • Software Development(B.Sc.)
  • Introduction to Software Design(B.Sc.)

 

 

Return to top

Current research and publications

Research Open Access Repository (ROAR@UEL)

http://dspace.uel.ac.uk/jspui/browse?type=author&value=Islam%2C+Shareeful

PhD Thesis

S. Islam, Software Development Risk Management Model – a goal-driven approach,  PhD thesis, Chair of Software & Systems Engineering, Technische Universität München, 2011,  http://mediatum.ub.tum.de/node?id=1002328, http://www.darteurope.eu/full.php?id=394794

 Journals

  1. H. Mouratidis, S. Islam, C. Kalloniatis, S.  Gritzalis, A framework to support selection of cloud providers based on security and privacy requirements. Journal of Systems and Software, Elsevier,2013,DOI: dx.doi. org/ 10.1016/j.jss.2013.03.011 ( impact factor 1.117), (In press)
  2. C. Kalloniatis, H.Mouratidis, S. Islam, Evaluating Cloud Deployment Scenarios Based on Security and Privacy Requirements, Requirements Engineering Journal (REJ),  Special Issue on requirements engineering for security, privacy and services in cloud, Springer-Verlag, 2013, http://dx.doi.org/10.1007/s00766-013-0166-7 (impact factor 0.971).
  3. M. Pavlidis, S. Islam, H. Mouratidis, P. Kearney, Modeling Trust Relationships for Developing Trustworthy Information Systems.  International Journal of  Information Systems Modelling and Design, 2013 (In press).
  4. R. Alavi,  S. Islam, H. Jahankhani, A. Al-Nermat, Analyzing Human Factors for an Effective Information Security Management System, International Journal of Secure Software Engineering (IJSSE), Special Issue on Cyber security, Vol 4, No 1, IGI Global publication,2013.
  5. A. Hudic , S. Islam, P. Kieseberg, S. Rennert, and E. R. Weippl, Data Confidentiality using Fragmentation in Cloud Computing, International Journal of Pervasive Computing and Communications, Vol 9, No 1, Emerald publisher, 2013.
  6. B. Aziz,  C. Blackwell, S. Islam,  A Framework for Digital Forensics and Investigations: The Goal-Driven Approach, International Journal of Digital Crime and Forensics (IJDCF), IGI Global publication, 2013 (In Press).
  7. K. Schneider, E. Knauss, S. H. Houmb, S. Islam, and J. Jürjens, Enhancing Security Requirements Engineering by Organisational Learning, Requirements Engineering Journal (REJ),  Special Issue on REFSQ 2011, DOI: 10.1007/s00766-011-0141-0 Springer-Verlag. (impact factor 0.862)
  8. H.  Mouratidis , C. Kalloniatis , S. Islam , M. Philippe Huget , and S. Gritzalis, Aligning Security and Privacy to Support the Development of Secure Information Systems,  special issue  Security in Information Systems, Journal of Universal Computer Science(J.UCS) ,2012, (impact factor 0.669)
  9. M. Pavlidis, H. Mouratidis and S. Islam , Modelling Security Using Trust based Concepts,  International Journal of Secure Software Engineering (IJSSE), Special issue on security modelling, IGI publication.  
  10. S. Islam , H. Mouratidis and C. Kalloniatis, A.hudic, and L.Zechner, Model based Process to Support Security and Privacy Requirements Engineering, International Journal of Secure Software Engineering (IJSSE),  Vol. 3, issue 3, September 2012, IGI Global publication.  
  11. S. Islam and S. H.  Houmb, Towards a Framework for Offshore Outsource Software Development Risk Management Model, Vol 6, No 1 (2011), 38-47, Jan 2011, Journal of Software (JSW), Special Issue on ICCIT 09,  Academy Publisher, doi:10.4304/jsw.6.1.38-47
  12. S. Islam, H. Mouratidis and J. Jürjens, A Framework to Support Alignment of Secure Software Engineering with Legal Regulations, Journal of Software and Systems Modeling (SoSyM), Theme Section on Non-Functional System Properties in Domain-Specific Modeling Languages (NFPinDSML), Vol 10, No 3, page 369-394, 2011, Springer-Verlag. (impact factor 1.533)
  13. S. H. Houmb, S. Islam, E. Knauss, J. Jürjens and K. Schneider, Eliciting Security Requirements and Tracing them to Design: An Integration of Common Criteria, Heuristics, and UMLsec, Requirements Engineering Journal (REJ), Vol 15, No 1, 2010, PP 63-93., March 2010, Special Issue on Security Requirements Engineering, Springer-Verlag.(impact factor 0.862)

 Book chapter

  1. J. Jürjens, M. Ochoa, H. Schmidt, L. Marchal, S.H. Houmb, S. Islam: Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications. In: 11th School on Formal Methods (SFM 2011), Bertinoro (Italy) 13-18 June 2011. LNCS
  2. S. Islam, H.  Mouratidis, E. Weippl, A Goal-driven Risk Management Approach to Support Security and Privacy Analysis of Cloud-based  System, Security Engineering for Cloud Computing: Approaches and Tools, IGI Publication.(In Press)

  3. S. Islam, Anca. J.  Stoica, Software Risk Management Modeling Using Goal-Driven Approach from Early Requirements Engineering, Book name : Software risk management, Academy publisher

     

 Conferences/Workshops

  1. C. Blackwell , S. Islam, and B. Aziz, Implementation of digital forensics investigations using a goal-driven approach for a questioned contract. The 9th  Annual IFIP WG 11.9 International Conference on Digital Forensics, Springer ,28 - 30 January, 2013, Orlando, USA.(In press)

  2. A. Stoica and  S. Islam,  Teaching Information Security Courses in Regular and Distance Learning Program, In proceeding of the  4th IEEE Global Engineering Education Conference( IEEE EDUCON 2013), Berlin, Germany. (In press)

  3. M. Pavlidis, H. Mouratidis and S. Islam, Dealing with Trust and Control  A
    Meta-Model for Trustworthy Information Systems Development, In proceeding of
    the Sixth IEEE International Conference on Research Challenges in Information
    Science,2012, Spain.(Best paper award)

  4. Anca J.  Stoica, S.Islam, Concurrent View Modeling for Software Risk Management at Early Development Stage, The IADIS international conference on Theory and Practice in Modern Computing(TPMC 2012)

  5. Anca. J.  Stoica , S. Islam,  Educational Methods for Software and Systems Development, IEEE  International Conference Interactive Collaborative Learning ( ICL2012), Villach, Austria.

  6. F. Z. Jorshari, H. Mouratidis and S. Islam , Extracting Security Requirements from  
    Relevant Laws and Regulations, In proceeding of the Sixth IEEE International Conference on Research Challenges in Information Science, 2012, Spain.

  7. M. Pavlidis, S. Islam , H. Mouratidis, A CASE Tool to Support Automated Modelling and Analysis of Security Requirements, Based on Secure Tropos, CAISE'11 Forum LNBIP, Springer.

  8. F. Z. Jorshari , M. Pavlidis, H. Mouratidis, S. Islam, and  David Preston , A Meta-model for Legal Compliance and Trustworthiness of Information Systems,  Proceedings of the 2nd International Workshop on Information Systems Security Engineering (WISSE 2012)  (in conjunction with CAiSE 2012),  June 2012, Gdask, Poland, Springer Lecture Notes in Business Information Processing (LNBIP). (In Press)

  9. E. Knauss, S. Houmb, K. Schneider, S. Islam and J. Jürjens, Supporting Requirements Engineers in Recognising Security Issues. In Proc. of  17th International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2011), Essen, 28-30 Mar. 2011. Springer-Verlag, 2011. Essen, Germany. Runner up to the best paper award in REFSQ2011
  10. S. Islam, H. Mouratidis and S. Wagner, Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations, In Proc. of 16th International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ '10), Springer-Verlag, 2010. Essen, Germany.
  11. S. Islam and S. H. Houmb, Integrating Risk Management Activities into Requirements Engineering, In Proc. of the 4th IEEE Research International Conference on Research Challenges in IS (RCIS2010), Nice, France.
  12. S. Islam, S. H. Houmb, D. Mendez-Fernandez and Md. M. A. Joarder, Offshore-Outsourced Software Development Risk Management Model, In Proc. of the 12th IEEE International Conference on Computer and Information Technology (ICCIT 2009), Dhaka, Bangladesh.
  13. S. Islam , Software Development Risk Management Model - a Goal Driven Approach,  Doctoral Symposium, In Proc. of the 7th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/ FSE), 2009,The Netherlands.
  14. S. Islam, M. A. Joarder and S. H. Houmb, Goal and Risk Factors for Offshore Outsourced Software Development from Vendors Viewpoint, In Proc. of the 4th IEEE International Conference on Global Software Engineering, IEEE Computer Society, 2009, Limerick, Ireland.
  15. S. Wagner, D.M. Fernandez, S. Islam and K. Lochmann, A Security Requirements Approach for Web Systems, In: Proc. Workshop Quality Assessment in Web (QAW 2009), CEUR, 2009 San Sebastian, Spain.
  16. S. Wagner and S. Islam, Modellierung von Software-Security mit aktivitätenbasierten Qualitätsmodellen, in: Tagungsband 2. Workshop zur Softwarequalitätsmodellierung und -bewertung (SQMB '09), Technical Report TUM-I0917, Technische Universität München, 2009, Kaiserslautern, Germany.
  17. S. Islam and J. Jürjens, Incorporating Security Requirements from Legal Regulations into UMLsec model, Modeling Security Workshop (MODSEC08), In Association with MODELS '08, Toulouse, France.
  18. S. Islam and W. Dong, Human Factors in Software Security Risk Management, In: Proc. of the 1st International Workshop on Leadership and Management in Software Architecture (LMSA.08), ACM Press, 2008, Leipzig, Germany.
  19. S. Islam and W. Dong, Security Requirements Addressing Security Risks for Improving Software Quality, In: Workshop-Band Software-Qualitätsmodellierung und bewertung (SQMB '08), Technical Report TUM-I0811, Technische Universität München, April, Germany.

 Tool demo/Poster

(1) T. Peters and S. Islam,  CISMS: A Framework To Support Organisation Compliance With Information Security Management System Standard For Small Medium Enterprise, British Conference of Undergraduate Research 2013 (BCUR13), Plymouth University, www.bcur.org.

(2)A. Hudic, L. Zechner, S. Islam, C. Krieg and E. R. Weippl, S. Winkler, R. Hable Towards a Unified Penetration Testing Taxonomy, Poster, Proceeding of the 4th IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT2012),The Netherlands

(3)M. Pavlidis, S. Islam , SecTro: A CASE Tool for Modelling Security in Requirements Engineering using Secure Tropos, pg 89-96,Proceedings of the CAiSE Forum 2011,CEUR-WS,vol 734, London, UK

(4) S. Islam, H. Mouratidis, M. Kang, Using Secure Tropos to develop a pre-employment screening system, iStar Showcase, Exploring the Goals of your Systems and Businesses, Practical experiences with i* modelling, June2011, City University London,UK.

Technical Reports

  1. M. Broy, A. Fleischmann, S. Islam, L. Kof, C. Leuxner, K. Lochmann, D. Mendez-Fernandez, B. Penzenstadler, W. Sitou and S. Winter, Towards an Integrated Approach to Requirement Engineering, Technical Report, TUM-I0935, Technische Universität München, December 2009, Germany.
  2. S. Houmb, S. Islam, J. Jurjens, M. Ochoa, M.l Hafner, F. Innerhofer-Oberperfler, M.a Weitlaner, B. Fontan, E. Felix, F. Paci, F. Dadeau, B. Chetali, Security Modelling Notation For Evolving Systems, Deliverable 4.1, Secure Change project

 

Return to top

Other scholarly activities

  • Reviewer ,  Journal of Software and Systems, Elsevier
  • Reviewer, Journal of Computer and Security, Elsevier
  • Reviewer, Requirements Engineering Journal, Springer
  • Reviewer, Software Quality Journal, Springer
  • Reviewer, Special Issue on Security in Information Systems, Journal of Universal Computer Science (JUCS)
  • PC member, The 5th International Conference on Emerging Network Intelligence (EMERGING 2013)
  • PC member, International Con. on Availability, Reliability and Security (AReS 2012)
  • IPC member, The 6th Conference on Software, Knowledge, Information Management and Applications(SKIMA2012)
  • PC member and Publicity chairs, Second International Workshop on Information Systems Security Engineering - WISSE’12 in CAiSE 2012 and WISSE'13 in CAiSE 2013
  • PC member, International workshop on Software Engineering for Secure Systems (SESS 12), ICSE 2012.
  • PC member, International Workshop on Security in Information Systems - WOSIS 2012 in ICEIS 2012 
    and WOSIS 2013 in ICEIS 2013
  • Co-reviewer, CAiSe 2011 and RE11
  • Editor, International Journal of Emerging Trends in Engineering and Development, RS publication, http://rspublication.com/ijeted/ijeted_index.htm
  • Editor, International Journal of Advanced Scientific and Technical Research, RS publication, http://rspublication.com/ijasr/
  • Editor, The CAiSE Doctoral Consortium, 2011
  • PC member, International Conference on Informatics, Electronics & Vision 2012 (ICIEV12)
  • PC Member,10th IEEE International Conference on Cybernetic Intelligent Systems
  • PC Member, 7th International Conference in Global Security Safety and Sustainability / 4th International Conference on e-Democracy
  • PC Member, PATTERNS 2010, PATTERNS 2011, PATTERNS 2012,PATTERNS 2013  International Conferences on Pervasive Patterns and Applications
  • Reviewer, International Journal of Software Engineering (IJSE)

Invited talk

  • Evaluating Cloud Deployment Scenarios Based on Security and Privacy Requirements , 17th January ,2013, Computing Department , The Open University
  • A framework to support alignment of secure software engineering with legal regulations, 28th June 2011, Secure Business Austria, Vienna, http://www.sba-research.org/
  • Software security and risk management, 6-7th September 2011, ERA infotech, www.erainfotechbd.com
  • Software development risk management model-a goal-driven approach, 6th December, 2011, Universität Stuttgart, Stuttgart

 

 

 

Return to top

Navigation menus:

Site-wide menu


Information for screenreader users:

For a general description of these pages and an explanation of how they should work with screenreading equipment please follow this link: Link to general description

For further information on this web site’s accessibility features please follow this link: Link to accessibility information