ITIS 6010/8010: Usable Security and Privacy
Spring 2009 6:00pm - 8:45pm Tuesdays Atkins 143
*The 6010 section of the course currently appears full on Banner, but there are still a few slots in the class. Email me if you would like to get in.
Much of the work into security and privacy solutions ignore a critical element – the human who must interact with those solutions. In this course, we investigate privacy and security from a user-centered point of view. How do people think about privacy and security? How do they interact with current solutions? What should be considered in designing user-friendly security systems? We will survey topics and research in Human Computer Interaction as they relate to privacy and security.
Professor: Dr. Heather Richter Lipford
Text: Security and Usability plus other research papers
Assignments:
Grading:
Class participation: 10 points
Reading summaries: 10 points
Assignments: 10 points
Exam: 20 points
Project: 50 points
Research topic: 20 points
(note that 8010 students have a total of 120 points)
The Syllabus:
The additional readings in the syllabus link directly to the paper. Please see the Readings page for the paper citation. The Readings page also lists a number of additional papers on the various course topics for optional reading if you are interested.
Week | Date | Reading | Topic | Due |
1 | 1/12 | Overview of course, Intro to HCI Methods | ||
2 | 1/19 | Ch. 3, 4, 33 | Usable Privacy & Security, HCI studies | Complete IRB Certification |
3 | 1/26 | Camp, Edwards, Dourish scan Anderson if unfamiliar with security |
Security and people | Assignment 1, Project Groups Formed
|
4 | 2/2 | Ch. 19, Acquisti, Iachello 1-3.2 | Privacy definitions and issues | Project Ideas due |
5 | 2/9 | Ch. 6, 7, 8, 9 | Authentication - passwords |
|
6 | 2/16 | Ch 10, 11, 12 | Authentication - cont. | Assignment 2 |
7 | 2/23 | Ch 16, 30, Johnny2 | Secure communications | Initial Project Plan due |
8 | 3/2 | Ch. 5, 14, Wu Scan (no summary required): Social Phishing, and the article |
Trust and semantic attacks | IRB protocol due Friday 3/5 |
3/9 | SPRING BREAK -- NO CLASS | |||
9 | 3/16 | Ch. 22, Jensen, Kelley | Privacy Policies | Project plan document due |
10 | 3/23 | Stajano, Langheinrich, Sadeh | Mobile & Ubiquitous Computing | |
11 | 3/30 | Ch. 13, Cranor, Smetters | Designing for Privacy and Security | |
12 | 4/6 | EXAM | ||
13 | 4/13 | CHI WEEK -- NO CLASS | ||
14 | 4/20 | Flechais, 21, 24 | Designing for Privacy and Security | Assignment 3 |
15 | 4/27 | Ch. 18, Botta, Conti | Security Admins | |
16 | 5/4 | Grab bag | Final project due | |
5/11 | Final Presentation, NEW TIME: 5-7:30 | Project presentations |