This course will examine how to design for security and privacy from a user-centered perspective by combining insights from computer systems and human-computer interaction (HCI). The student will learn about core security and privacy technologies, as well as HCI techniques for conducting robust user studies. The course covers topics including usable authentication, user-centered web security, anonymity software, privacy notices, security warnings, and data- driven privacy tools in domains ranging from social media to the Internet of Things.
Undergraduate 132 CRs
Lorrie Faith Cranor; Simson Garfinkel, Security and Usability: Designing Secure Systems that People can Use, O'reilly Media
Simson Garfinkel and Heather Richter Lipford. Usable security: History, Themes, and Challenges, Springer
content serial | Description |
---|
1 | Course Aim and Course outline, Fundamentals of Human-Computer Interaction: users, usability, tasks |
2 | Cognitive models |
3 | Design for usability |
4 | Prototyping, cybersecurity case study |
5 | Usability studies and testing |
6 | Quantitative and qualitative evaluation, cybersecurity case study |
7 | 7th week Assessment |
8 | Strategies for Secure Interaction Design |
9 | Authority and guidelines for interface design |
10 | Usable Authentication: authentication mechanisms |
11 | Biometrics, two-factor authentication |
12 | 12th week Assessment |
13 | Usable Privacy: privacy settings, and a user-centric privacy space framework |
14 | Personal data sharing |
15 | Data inference |
Start your application