Joseph Maguire

Orcid: 0000-0002-3718-7679

Affiliations:
  • University of Glasgow, School of Computing Science, United Kingdom


According to our database1, Joseph Maguire authored at least 39 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Work in Progress Workshop: Themes, Challenges and Opportunities.
Proceedings of the 2024 Conference on United Kingdom & Ireland Computing Education Research, 2024

2023
A Dialog About the Special Issues on Theory.
ACM Trans. Comput. Educ., March, 2023

The Different Types of Contributions to Knowledge (in CER): All Needed, But Not All Recognised.
ACM Trans. Comput. Educ., March, 2023

Expanding the Circle of Critical Friends in UK Computing Education Research with the Works-in-Progress (WiP) Workshop.
Proceedings of the 2023 Conference on United Kingdom & Ireland Computing Education Research, 2023

Research-led Active Learning Sessions in Cyber Security through Research Paper Reading.
Proceedings of the Computing Education Practice, 2023

Engaging Students in Threat Thinking with the Cyber Security Cinema.
Proceedings of the Computing Education Practice, 2023

Exploring Student Perceptions and Expectations of Cyber Security.
Proceedings of the Computing Education Practice, 2023

Computing Education Research in the UK & Ireland.
Proceedings of the Past, 2023

2022
Enhancing UK Computing Education Research Infrastructure with Doctoral Consortia.
Proceedings of the UKICER 2022: The United Kingdom and Ireland Computing Education Research Conference, Dublin, Ireland, September 1, 2022

Promoting Engagement in Remote Computing Ethics Education.
Proceedings of the CEP 2022: Computing Education Practice 2022, 2022

Assessing Knowledge and Skills in Forensics with Alternative Assessment Pathways.
Proceedings of the CEP 2022: Computing Education Practice 2022, 2022

2021
Forming Community in Computing Science Education with Research in Practice Project Activities.
Proceedings of the UKICER '21: United Kingdom and Ireland Computing Education Research Conference, Glasgow, UK, September 2, 2021

Supporting Computing Educators to Create a Cycle of Teaching and Computing Education Research.
Proceedings of the UKICER '21: United Kingdom and Ireland Computing Education Research Conference, Glasgow, UK, September 2, 2021

Opportunities to Fail: Using Peer-review to support Assessment Literacy in Cyber Security.
Proceedings of the Koli Calling '21: 21st Koli Calling International Conference on Computing Education Research, Joensuu, Finland, November 18, 2021

Improving Computer Science Student Graduate Skills Through Assessment.
Proceedings of the CEP '21: Computing Education Practice 2021, 2021

2020
Supporting the Computing Science Education Research Community with Rolling Reviews.
Proceedings of the United Kingdom & Ireland Computing Education Research Conference, 2020

Mapping the Landscape of Peer Review in Computing Education Research.
Proceedings of the Working Group Reports on Innovation and Technology in Computer Science Education, 2020

Reviewing Computing Education Papers.
Proceedings of the 2020 ACM Conference on Innovation and Technology in Computer Science Education, 2020

Demystifying and Decluttering Participation in Software Engineering Education Programmes.
Proceedings of the 2020 ACM Conference on Innovation and Technology in Computer Science Education, 2020

Experiences of Assessment in Data and Security Courses using Personal Response Systems.
Proceedings of the ICEIT 2020, 2020

Keeping Software Engineering Students in Touch with Not Only What They are to Learn, But with Why.
Proceedings of the 32nd IEEE Conference on Software Engineering Education and Training, 2020

2019
Back to the future: shaping software engineering education with lessons from the past.
Inroads, 2019

What Do We Do When We Teach Software Engineering?
Proceedings of the 1st UK & Ireland Computing Education Research Conference, 2019

Securing the Human: A Review of Literature on Broadening Diversity in Cybersecurity Education.
Proceedings of the Working Group Reports on Innovation and Technology in Computer Science Education, 2019

Devising Work-based Learning Curricula with Apprentice Research Software Engineers.
Proceedings of the 2019 ACM Conference on Innovation and Technology in Computer Science Education, 2019

Securing the Human: Broadening Diversity in Cybersecurity.
Proceedings of the 2019 ACM Conference on Innovation and Technology in Computer Science Education, 2019

Mentoring Mentors in Cooperative Software Engineering Education Programmes.
Proceedings of the 2019 ACM Conference on International Computing Education Research, 2019

Data Protection and Privacy Regulations as an Inter-Active-Constructive Practice.
Proceedings of the 3rd Conference on Computing Education Practice, 2019

2017
Privacy of Personal Things in Active Learning Spaces Need Individually Evolved Requirements.
Proceedings of the 1st ACM Workshop on the Internet of Safe Things, 2017

2016
ZeTA-Zero-Trust Authentication: Relying on Innate Human Ability, Not Technology.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

2015
Alternative Authentication in the Wild.
Proceedings of the 2015 Workshop on Socio-Technical Aspects in Security and Trust, 2015

Regulating Access to Adult Content (with Privacy Preservation).
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

2014
ACCESS: Describing and Contrasting - Authentication Mechanisms.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

2013
An ecologically valid evaluation of an observation-resilient graphical authentication mechanism.
PhD thesis, 2013

SNIPPET: Genuine knowledge-based authentication.
Proceedings of the 2013 Information Security for South Africa, 2013

Are Graphical Authentication Mechanisms As Strong As Passwords?
Proceedings of the 2013 Federated Conference on Computer Science and Information Systems, 2013

Shrinking the Authentication Footprint.
Proceedings of the European Information Security Multi-Conference (EISMC 2013), 2013

2012
You only live twice or "the years we wasted caring about shoulder-surfing".
Proceedings of the BCS-HCI '12 Proceedings of the 26th Annual BCS Interaction Specialist Group Conference on People and Computers, 2012

2009
Armchair authentication.
Proceedings of the 2009 British Computer Society Conference on Human-Computer Interaction, 2009


  Loading...