Lecturer in Computer Science and Technology
Marcia joined the department as a full time Lecturer in Computer Science and Technology in October 2013 and prior to this (2007-2008 and 2012-2013) worked at the University as a visiting lecturer.
She is a researcher in the Institute for Research in Applicable Computing (IRAC), Centre for Research in Distributed technologies (CREDIT) and is an associate of the National Centre for Cyberstalking Research (NCCR) where she works as part of the technical team.
She was awarded a full scholarship for her PhD via the Steel Memorial Trust PhD Studentship and completed her PhD on the topic of "Inclusive and Secure Design of an Online Authentication system" in 2013.
Marcia obtained an MSc by research in Computer Security in 2007 which was funded by the Department of Computing and Information Systems at the University of Luton, where she also gained a BSc (Hons), First class in Computer Science in 2005.
In addition to her academic activities, Marcia has worked commercially as a Web Developer and Accessibility consultant.
Marcia gained FHEA status by completing the Postgraduate Certificate in Teaching Higher Education (PgCTHE) by portfolio in 2015.
In addition to supervising projects at BSc, MSc and PhD level, she is currently also involved in teaching on the following units:
- Computer and Network Security (also unit co-ordinator)
- Computer Security (Oman) (also unit co-ordinator)
- Content Creation and Design (also unit co-ordinator)
- Programming for Interactive Media
- Fundamentals of Computer Studies
She also assists with QA moderation of degrees offered by some of the University's partner colleges in the UK and runs two blogs for the department:
- "UoB Ka-Blog!" Which acts as a forum for discussion and participation between people involved in (or previously involved in) computer games, animation and interactive digital technologies courses at the University of Bedfordshire, academic researchers and creative industry professionals and;
- "The CIS050 supplementary blog" which runs in tangent to the CIS050-6 "Computer Security" unit and aims to support collaborative discussion of security and privacy topics between students, ex-students, lecturers, researchers and industry professionals.
Authentication systems, Cyberstalking , Security, Usability, Accessibility and Privacy (especially in smart and online virtual community contexts).
Dr Gibson is also interested to hear from outstanding candidates who are interested in researching at PhD level, topics listed above.
- M. Gibson & A. Brown (2015) ‘The Importance of Controlling Your Online Presence - Understanding and Pre-empting Attacks that use your Public Information’. In E. Short & J. Barnes (Eds.), A Practical Guide to Coping with Cyberstalking (pp. 63-71). Andrews UK.
- M. Gibson & A. Brown (2015) ‘A structured approach for locating and removing your personal information from the World Wide Web’. In E. Short & J. Barnes (Eds.), A Practical Guide to Coping with Cyberstalking (pp. 72-84). Andrews UK.
- M. Gibson, K. Renaud, M. Conrad & C. Maple (2015). ‘Play that funky password! Recent Advances in Authentication with Music’. In (Eds.) M. Gupta. Handbook of Research in Emerging Developments in Data Privacy. Hershey, PA: Information Science Reference.
- A. Brown & M. Gibson (2015) ‘Strategies for maintaining privacy when using social media sites, apps and services’. In E. Short & J. Barnes (Eds.), A Practical Guide to Coping with Cyberstalking (pp. 85-93). Andrews UK.
- A. Brown & M. Gibson (2015) ‘Setting social media privacy controls: A practical guide to protecting yourself’. In E. Short & J. Barnes (Eds.), A Practical Guide to Coping with Cyberstalking (pp. 94-113). Andrews UK.
- M. Gibson, K. Renaud, M. Conrad & C. Maple (2012) `Music is the Key: Using our Enduring Memory for Songs to Help Users Log On'. In M. Gupta, J. Walp, & R. Sharman (Eds.) Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions (pp. 137-157). Hershey, PA: Information Science Reference. doi:10.4018/978-1-4666-0197-0.ch008
- M. Gibson (2010) 'Opening the Web for All, Enhancing digital inclusion through authentication system design'. EuroSOUPS: Workshop on the development of a European Symposium on Usable Privacy and Security (24th November, Northumbria University, Newcastle, UK).
- M. Gibson, M. Conrad & C. Maple (2010) 'Infinite Alphabet Passwords: A Unified Model for a Class of Authentication Systems'. Procs. International Conference on Security and Cryptography SECRYPT 2010 (26-28th July, Athens, Greece). pp. 94-99. SciTePress. 978-989-8425-18-8.
- M. Gibson, M. Conrad, C. Maple & K. Renaud (2010) 'Accessible and secure? Design constraints on image and sound based passwords' Information Society (i-Society), International Conference on, pp.423-428, 28-30 June 2010. IEEE Publications 978-0-9564263-3-8
- M. Gibson, K. Renaud, M. Conrad & C. Maple (2009) 'Musipass: Authenticating me softly with "my" song', Procs. 16th New Security Paradigms Workshop NSPW09 (8-11 Sept 2009 in Oxford, UK), pp. 85-100, ACM, New York, USA. 978-1-60558-845-2.
- M. Conrad, T. French & M. Gibson (2006) 'A Pragmatic and Musically Pleasing Production System for Sonic Events', Procs. 10th IEEE International Conference on Information Visualisation IV06 (5-7 July 2006 in London, UK), pp. 630-635, IEEE Publications 0-7695-2602-0.
Other (selected) research activities
- Reviewer for International Journal for Human-Computer Studies
- Poster presentation: 'Musipass authenticating me softly with "my" song'. SICSA Socio-Technical Systems Meeting (Sociotechnical issues in Security), 20th April 2010, Department of Computing Science, University of Glasgow, UK.
- Invited seminar talk: 'Infinite Alphabet Password Systems'. Software engineering and Technology interest group, University of Glasgow, UK, 29th Oct 2007.
- Milton Keynes Science Festival. The Centre MK. July 2007. Hosting a stand to showcase to the general public some of the important and exciting research conducted at the university.
Dr Marcia Gibson