Publications

Publications by categories in reversed chronological order.

2023

  1. Engaging Students in Threat Thinking with the Cyber Security Cinema
    Joseph Maguire, Rosanne English, and Steve Draper
    In Computing Education Practice, Jan 2023
  2. Exploring Student Perceptions and Expectations of Cyber Security
    Rosanne English, and Joseph Maguire
    In Computing Education Practice, Jan 2023
  3. Research-led Active Learning Sessions in Cyber Security through Research Paper Reading
    Joseph Maguire, Rosanne English, and Steve Draper
    In Computing Education Practice, Jan 2023

2022

  1. Criteria and Scrutiny in Computing Education Research
    Kate Sanders, Joseph Maguire, and Monica M. McGill
    In Dagstuhl Seminar 22442: Toward Scientific Evidence Standards in Empirical Computer Science, Nov 2022
  2. CER in the UK & Ireland
    Brett A. Becker, Steven Bradley, Joseph Maguire, and 5 more authors
    In Past, Present and Future of Computing Education Research: a Global Perspective, Sep 2022
  3. Challenges and opportunities of teaching cybersecurity in mainstream computing programmes in the UK
    Tom Prickett, Longzhi Yang, Alastair Irons, and 9 more authors
    In Cybersecurity Teaching in Higher Education, Jun 2022
  4. Shaping Software Engineering with Lessons from the Past
    Joseph Maguire
    In University of Edinburgh Informatics Teaching Festival 2022, May 2022
  5. The different types of contributions to knowledge (in CER): All needed, but not all recognised
    Steve Draper, and Joseph Maguire
    ACM Transactions on Computing Education, Apr 2022
  6. Promoting Engagement in Remote Computing Ethics Education
    Joseph Maguire, and Steve Draper
    Jan 2022

2021

  1. Engaging and Active Security Education 2022 (EASE 2022) Workshop
    Joseph Maguire, and  Mac Dermott
    In Computing Education Practice 2022 (CEP 2022), Dec 2021
  2. Opportunities to Fail: Using Peer-review to Support Assessment Literacy in Cyber Security
    Joseph Maguire, and Rosanne English
    Nov 2021
  3. Engaging and Active Security Education (EASE) Workshop
    Joseph Maguire, and Rosanne English
    In Computing Education Practice (CEP 2021), Jan 2021
  4. Improving Computer Science Student Graduate Skills Through Assessment
    Rosanne English, Joseph Maguire, and Alan Hayes
    Jan 2021
  5. Supporting Computing Educators to Create a Cycle of Teaching and Computing Education Research
    Neil C.C. Brown, Quintin Cutts, Maria Kallia, and 3 more authors
    Jan 2021

2020

  1. Keeping Software Engineering Students in Touch With Not Only What They Are to Learn, But With Why
    Syed Waqar Nabi, Joseph Maguire, Steve Draper, and 1 more author
    Oct 2020
  2. Supporting the Computing Science Education Research Community with Rolling Reviews
    Joseph Maguire, and Quintin Cutts
    Sep 2020
  3. Reviewing Computing Education Papers
    Marian Petre, Kate Sanders, Robert McCartney, and 9 more authors
    Jun 2020
  4. Mapping the Landscape of Peer Review in Computing Education Research
    Marian Petre, Kate Sanders, Robert McCartney, and 9 more authors
    Jun 2020
  5. Building in Resilience Through Graduate Skills Computer Science Assessment
    Rosanne English, and Joseph Maguire
    In QAA Scotland Learning From Disruption: Exploring What Counts in Higher Education, Jun 2020
  6. Experiences of Assessment in Data and Security Courses using Personal Response Systems
    Rosanne English, and Joseph Maguire
    Feb 2020

2019

  1. Securing the Human: a Review of Literature on Broadening Diversity in Cybersecurity Education
    Xenia Mountrouidou, David Vosen, Chadi Kari, and 6 more authors
    Dec 2019
    The team acknowledges support provided by the US National Science Foundation under Award No. DUE-1700254.
  2. Towards a Taxonomy of Video for HCI Education
    Stephen Snow,  Joseph Maguire, Chris Evans, and 5 more authors
    In Trends and good practices in research and teaching. A Spanish-English collaboration, Dec 2019
  3. Back to the future: shaping software engineering education with lessons from the past
    Joseph Maguire, and Quintin Cutts
    ACM Inroads, Dec 2019
  4. What Do We Do When We Teach Software Engineering?
    Joseph Maguire, Steve Draper, and Quintin Cutts
    Sep 2019
  5. Mentoring Mentors in Cooperative Software Engineering Education Programmes
    Joseph Maguire, Nathalie Sheridan, Steve Draper, and 1 more author
    Jul 2019
  6. Devising Work-based Learning Curricula With Apprentice Research Software Engineers
    Joseph Maguire, Quintin Cutts, Jack Parkinson, and 2 more authors
    Jul 2019
  7. Securing the Human
    Mohammad Azhar, Sajal Bhatia, Greg Gagne, and 6 more authors
    In Proceedings of the 2019 ACM Conference on Innovation and Technology in Computer Science Education, Jul 2019
  8. Technology Beyond the VLE
    Joseph Maguire, Mary McVey, Emily Nordmann, and 1 more author
    In 12th Annual University of Glasgow Learning and Teaching Conference, Apr 2019
  9. Data Protection and Privacy Regulations as an Inter-Active-Constructive Practice
    Joseph Maguire, Rosanne English, and Stephen Draper
    Jan 2019

2018

  1. Assessing the Unseen: Roles of Confidentiality and Trust in Software Engineering Work-based Learning Programmes [Poster]
    Joseph Maguire, Steve Draper, and Quintin Cutts
    In ACM Conference on International Computing Education Research, Aug 2018
  2. Assessing the Unseen: Roles of Confidentiality and Trust in Software Engineering Work-based Learning Programmes [Presentation]
    Joseph Maguire, Steve Draper, and Quintin Cutts
    In ACM Conference on International Computing Education Research, Aug 2018
  3. Scaffolding Video Assignments in Cyber Security
    Joseph Maguire, Stephen Draper, and Rosanne English
    In Workshop on Using Video in Computer Science Education, Aug 2018
  4. Consuming versus Authoring: Reflections on Video Assignments for Usable Security
    Joseph Maguire, Stephen Draper, and Rosanne English
    In Workshop on HCI and the Educational Technology Revolution, co-located with the International Working Conference on Advanced Visual Interfaces, May 2018
  5. Beyond Capture: Perspectives, Privacy and Pedagogy
    Joseph Maguire
    In Lecture Capture Symposium, May 2018
  6. Assessing the Unseen: Roles of Confidentiality and Trust in Software Engineering Work-based Learning Programmes [Poster]
    Joseph Maguire, Steve Draper, and Quintin Cutts
    In ACM Conference on International Computing Education Research, Aug 2018
  7. Assessing the Unseen: Roles of Confidentiality and Trust in Software Engineering Work-based Learning Programmes [Presentation]
    Joseph Maguire, Steve Draper, and Quintin Cutts
    In ACM Conference on International Computing Education Research, Aug 2018

2017

  1. Lessons Learned from Evaluating Eight Password Nudges in the Wild
    Karen Renaud, Verena Zimmermann, Joseph Maguire, and 1 more author
    Oct 2017
  2. Lessons Learned From Integrating Industry and Exposing Enterprises to Computing Science Students
    Joseph Maguire, and Rosanne English
    In SEED: Skills in Entrepreneurial Education - SICSA Worskhop, Sep 2017
  3. Preserving Privacy and Reconceptualising Sharing in Active Learning Spaces
    Joseph Maguire
    In Higher Education Academy Annual Conference 2017, Jul 2017
  4. Close Encounters of the Industry Kind
    Joseph Maguire
    In 2017 Annual Council of Professors and Heads of Computing Conference, Apr 2017
  5. Close Encounters of the Industry Kind
    Joseph Maguire
    In 2017 Annual Council of Professors and Heads of Computing Conference, Apr 2017
  6. Lessons Learned From Integrating Industry and Exposing Enterprises to Computing Science Students
    Joseph Maguire, and Rosanne English
    In SEED: Skills in Entrepreneurial Education - SICSA Worskhop, Sep 2017
  7. Lessons Learned from Evaluating Eight Password Nudges in the Wild
    Karen Renaud, Verena Zimmermann, Joseph Maguire, and 1 more author
    Oct 2017
  8. Preserving Privacy and Reconceptualising Sharing in Active Learning Spaces
    Joseph Maguire
    In Higher Education Academy Annual Conference 2017, Jul 2017
  9. Privacy of Personal Things in Active Learning Spaces Need Individually Evolved Requirements
    Joseph Maguire, and Steve Draper
    Jul 2017

2016

  1. ZETA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology
    Andreas Gutmann, Karen Renaud, Joseph Maguire, and 4 more authors
    Jul 2016

2015

  1. State of Alternative Authentication Research in Scotland
    Joseph Maguire
    In Centre for Advanced Security Research at Technische Universität Darmstadt Seminar, Feb 2015
  2. Alternative Authentication in the Wild
    Joseph Maguire, and Karen Renaud
    Jul 2015
  3. Regulating Access to Adult Content (with Privacy Preservation)
    Karen Renaud, and Joseph Maguire
    Jul 2015

2014

  1. Contemplating Skill-Based Authentication
    Karen Renaud, Joe Maguire, Johan Niekerk, and 1 more author
    Africa Research Journal, Jun 2014
  2. ACCESS: Describing and Contrasting Authentication Mechanisms
    Karen Renaud, Melanie Volkamer, and Joseph Maguire
    Jun 2014
  3. ACCESS: Describing and Contrasting Authentication Mechanisms
    Karen Renaud, Melanie Volkamer, and Joseph Maguire
    Jun 2014
  4. Contemplating Skill-Based Authentication
    Karen Renaud, Joe Maguire, Johan Niekerk, and 1 more author
    Africa Research Journal, Jun 2014

2013

  1. Shrinking the Authentication Footprint
    K. Renaud, and J. Maguire
    May 2013
  2. How Do You Solve A Problem Like Authentication?
    Joseph Maguire, and Karen Renaud
    In Human Factors in the Safety and Security of Critical Systems, Mar 2013
  3. Are Graphical Authentication Mechanisms as Strong as Passwords?
    Karen Renaud, Peter Mayer, Melanie Volkamer, and 1 more author
    Mar 2013
  4. Are Graphical Authentication Mechanisms as Strong as Passwords?
    Karen Renaud, Peter Mayer, Melanie Volkamer, and 1 more author
    Mar 2013
  5. How Do You Solve A Problem Like Authentication?
    Joseph Maguire, and Karen Renaud
    In Human Factors in the Safety and Security of Critical Systems, Mar 2013
  6. SNIPPET: Genuine Knowledge-Based Authentication
    Karen Renaud, Demetris Kennes, Johan Niekerk, and 1 more author
    Aug 2013
  7. Shrinking the Authentication Footprint
    K. Renaud, and J. Maguire
    May 2013

2012

  1. You Only Live Twice or The Years We Wasted Caring about Shoulder-Surfing
    K. Renaud, and Joseph Maguire
    May 2012
  2. You Only Live Twice or The Years We Wasted Caring about Shoulder-Surfing
    K. Renaud, and Joseph Maguire
    May 2012

2011

  1. An Alternative Avatar
    Joseph Maguire, and Karen Renaud
    In British HCI 2011 Health, Wealth and Happiness, Jul 2011
  2. An Alternative Avatar
    Joseph Maguire, and Karen Renaud
    In British HCI 2011 Health, Wealth and Happiness, Jul 2011

2009

  1. Student Generated Podcasts: Learning to Cascade Rather than Create
    Joseph Maguire, Susan Stuart, and Stephen Draper
    In 2nd Annual University of Glasgow Learning and Teaching Conference: Promoting Student Success through the Curriculum, Apr 2009
  2. Armchair authentication
    Karen Renaud, and Joseph Maguire
    Apr 2009
  3. Armchair authentication
    Karen Renaud, and Joseph Maguire
    Apr 2009

2008

  1. Student Generated Podcasts: Learning to Cascade Rather than Create
    Joseph Maguire, Susan Stuart, and Stephen Draper
    Oct 2008
  2. Student Generated Podcasts: Learning to Cascade Rather than Create
    Joseph Maguire, Susan Stuart, and Stephen Draper
    Oct 2008

2007

  1. Exploring podcasting as part of campus-based teaching
    Stephen W. Draper, and Joe Maguire
    Practice and Evidence of Scholarship of Teaching and Learning in Higher Education, Apr 2007
  2. Exploring podcasting as part of campus-based teaching
    Stephen W. Draper, and Joe Maguire
    Practice and Evidence of Scholarship of Teaching and Learning in Higher Education, Apr 2007