Position: Lecturer and Programme Leader
Location: Knowledge Dock, KD.2.21
Telephone: +44(0)2082237273 Direct Line
Email: shareeful@uel.ac.uk
Contact address:
School of Architecture, Computing and Engineering (ACE),
University of East London,
Docklands Campus,
4-6 University Way,
London E16 2RD.
Dr. Shareeful Islam was awarded his PhD in Software Risk Management Model using goal-driven approach from chair of Software & Systems Engineering (I4), Technische Universität München, Germany. He has received a Postgraduate Certificate on Teaching and Learning in higher
education(PGcert) from the University of East London and a fellow of HE academy. He has also received M.Sc. degree in Information Communication System Security(ICSS) from the Royal Institute of Technology, Sweden. He also received M.Sc. degree in Computer Science (CS)and B.Sc. (Hon’s) in applied physics and electronics(APE) from the University of Dhaka, Bangladesh. He completed the ISO 9001:2001 lead auditor certification and is a certified quality management system auditor. He has worked as an Assistant Professor at the Institute of Information Technology (IIT), University of Dhaka, Bangladesh. . He has more than 30 publication in well recognized journals and conferences proceedings . His main research interests are in the field of risk management,cyber crime, security and privacy. Special interests are risk management model, forensic investigation, security and privacy, requirements engineering, model based development and cloud computing. He is also involved in KTP and EPSRC projects and previously worked in EU project.
Modules:
http://dspace.uel.ac.uk/jspui/browse?type=author&value=Islam%2C+Shareeful
S. Islam, Software Development Risk Management Model – a goal-driven approach, PhD thesis, Chair of Software & Systems Engineering, Technische Universität München, 2011, http://mediatum.ub.tum.de/node?id=1002328, http://www.darteurope.eu/full.php?id=394794
S. Islam, H. Mouratidis, E. Weippl, A Goal-driven Risk Management Approach to Support Security and Privacy Analysis of Cloud-based System, Security Engineering for Cloud Computing: Approaches and Tools, IGI Publication.(In Press)
S. Islam, Anca. J. Stoica, Software Risk Management Modeling Using Goal-Driven Approach from Early Requirements Engineering, Book name : Software risk management, Academy publisher
C. Blackwell , S. Islam, and B. Aziz, Implementation of digital forensics investigations using a goal-driven approach for a questioned contract. The 9th Annual IFIP WG 11.9 International Conference on Digital Forensics, Springer ,28 - 30 January, 2013, Orlando, USA.(In press)
A. Stoica and S. Islam, Teaching Information Security Courses in Regular and Distance Learning Program, In proceeding of the 4th IEEE Global Engineering Education Conference( IEEE EDUCON 2013), Berlin, Germany. (In press)
M. Pavlidis, H. Mouratidis and S. Islam, Dealing with Trust and Control A
Meta-Model for Trustworthy Information Systems Development, In proceeding of
the Sixth IEEE International Conference on Research Challenges in Information
Science,2012, Spain.(Best paper award)
Anca J. Stoica, S.Islam, Concurrent View Modeling for Software Risk Management at Early Development Stage, The IADIS international conference on Theory and Practice in Modern Computing(TPMC 2012)
Anca. J. Stoica , S. Islam, Educational Methods for Software and Systems Development, IEEE International Conference Interactive Collaborative Learning ( ICL2012), Villach, Austria.
F. Z. Jorshari, H. Mouratidis and S. Islam , Extracting Security Requirements from
Relevant Laws and Regulations, In proceeding of the Sixth IEEE International Conference on Research Challenges in Information Science, 2012, Spain.
M. Pavlidis, S. Islam , H. Mouratidis, A CASE Tool to Support Automated Modelling and Analysis of Security Requirements, Based on Secure Tropos, CAISE'11 Forum LNBIP, Springer.
F. Z. Jorshari , M. Pavlidis, H. Mouratidis, S. Islam, and David Preston , A Meta-model for Legal Compliance and Trustworthiness of Information Systems, Proceedings of the 2nd International Workshop on Information Systems Security Engineering (WISSE 2012) (in conjunction with CAiSE 2012), June 2012, Gdask, Poland, Springer Lecture Notes in Business Information Processing (LNBIP). (In Press)
Tool demo/Poster
(1) T. Peters and S. Islam, CISMS: A Framework To Support Organisation Compliance With Information Security Management System Standard For Small Medium Enterprise, British Conference of Undergraduate Research 2013 (BCUR13), Plymouth University, www.bcur.org.
(2)A. Hudic, L. Zechner, S. Islam, C. Krieg and E. R. Weippl, S. Winkler, R. Hable Towards a Unified Penetration Testing Taxonomy, Poster, Proceeding of the 4th IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT2012),The Netherlands
(3)M. Pavlidis, S. Islam , SecTro: A CASE Tool for Modelling Security in Requirements Engineering using Secure Tropos, pg 89-96,Proceedings of the CAiSE Forum 2011,CEUR-WS,vol 734, London, UK
(4) S. Islam, H. Mouratidis, M. Kang, Using Secure Tropos to develop a pre-employment screening system, iStar Showcase, Exploring the Goals of your Systems and Businesses, Practical experiences with i* modelling, June2011, City University London,UK.
Technical Reports
PC member, International Workshop on Security in Information Systems - WOSIS 2012 in ICEIS 2012
and WOSIS 2013 in ICEIS 2013
Invited talk

For a general description of these pages and an explanation of how they should work with screenreading equipment please follow this link: Link to general description
For further information on this web site’s accessibility features please follow this link: Link to accessibility information