Research Publications

2022

To Appear:

Designing and Developing a Scenario Based Curriculum for Cyber Education in HE, English, R., 2022, (Accepted/In press) Cybersecurity Teaching in Higher Education. Springer

Challenges and Opportunities of Teaching Cybersecurity in Mainstream Computing Programmes in the U.K. Prickett, T., Yang, L., Irons, A., Miller, K., Brooke, P., Crick, T., Hayes, A., Davenport, J. H., English, R., Maguire, J., Bechkoum, K. & Jones, A., 2022, (Accepted/In press) Cybersecurity Teaching in Higher Education.

2021

Opportunities to fail: using peer-review to support assessment literacy in cyber security Maguire, J. & English, R., 18 Nov 2021, Koli Calling ‘21: 21st Koli Calling International Conference on Computing Education Research. Seppälä, O. & Petersen, A. (eds.). New York, NY., p. 1-2 2 p. 33. (ACM International Conference Proceeding Series).

2020

Building in resilience through graduate skills computer science assessment English, R. & Maguire, J., 4 Jun 2020. 8 p.

Experiences of assessment in data and security courses using personal response systems English, R. & Maguire, J., 13 Feb 2020, ICEIT 2020 - Proceedings of the 2020 9th International Conference on Educational and Information Technology. New York, NY., p. 38–43 6 p.

Improving computer science student graduate skills through assessment English, R., Maguire, J. & Hayes, A., 3 Sep 2020. 1 p.

2019

Designing computer security assessments to reduce plagiarism English, R., 9 Jan 2019, Proceedings - 3rd Conference on Computing Education Practice, CEP 2019. New York, NY., 4 p.

Data protection and privacy regulations as an inter-active-constructive practice Maguire, J., English, R. & Draper, S., 9 Jan 2019, CEP ‘19 Proceedings of the 3rd Conference on Computing Education Practice . New York, 9

2018

Consuming versus authoring: reflections on video assignments for usable security Maguire, J., Draper, S. & English, R., 1 Jun 2018, AVI ‘18 2018 International Conference on Advanced Visual Interfaces, AVI ‘18 : Castiglione della Pescaia, Italy — May 29 - June 01, 2018. New York

2016

Why don’t UK citizens protest against privacy-invading dragnet surveillance? Renaud, K., Flowerday, S., English, R. & Volkamer, M., 2016, In: Information and Computer Security. 24, 4, p. 400-416 17 p.

2015

Simulating and modelling the effectiveness of graphical password intersection attacks English, R., 25 Aug 2015, In: Concurrency and Computation: Practice and Experience. 27, 12, p. 3089-3107 19 p.

2014

Modelling the security of recognition-based graphical passwords English, R., 1 Jul 2014, Proceedings of the 8th International Symposium on Human Aspects of Information Security and Assurance (HAISA) 2014. Plymouth, p. 112-121 10 p.

You have three tries before lockout - why three? Renaud, K., English, R., Wynne, T. & Weber, F., 1 Jul 2014, Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance (HAISA) 2014. Plymouth, UK, p. 101-111 11 p.

Page retrievability calculator Azzopardi, L., English, R., Wilkie, C. & Maxwell, D., 2014, Advances in Information Retrieval: 36th European Conference on IR Research, ECIR 2014, Amsterdam, The Netherlands, April 13-16, 2014. Proceedings. New York, NY, USA: Springer International Publishing AG, p. 737-741 5 p. (Lecture Notes in Computer Science; vol. 8416). ##2012

The effectiveness of intersection attack countermeasures for graphical passwords English, R. & Poet, R., 6 Sep 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). Piscataway, N.J.: IEEE, 8 p.

2011

Measuring the revised guessability of graphical passwords English, R. & Poet, R., 27 Oct 2011, 2011 5th International Conference on Network and System Security. Samarati, P., Foresti, S., Hu, J. & Livraga, G. (eds.). Piscataway: IEEE, p. 364-368 5 p.

Towards a metric for recognition-based graphical password security English, R. & Poet, R., 27 Oct 2011, 5th International Conference on Network and System Security. Samarati, P., Foresti, S., Hu, J. & Livraga, G. (eds.). Piscataway: IEEE, p. 239-243 5 p.

2010

Comparison of high capacity steganography techniques English, R., 13 Jan 2010, Proceedings of the 2010 International Conference of Soft Computing and Pattern Recognition, SoCPaR 2010. Martin, T., Muda, A. K., Abraham, A., Prade, H., Laurent, A., Laurent, D. & Sans, V. (eds.). Piscataway: IEEE, p. 448-453 6 p.