Verena Zimmermann: Katalogdaten im Frühjahrssemester 2023 |
Name | Frau Prof. Dr. Verena Zimmermann |
Namensvarianten | Verena Schochlow |
Lehrgebiet | Sicherheit, Privatsphäre und Gesellschaft |
Adresse | Sicherheit, Privatsphäre u. Gesell ETH Zürich, STB G 19 Stampfenbachstrasse 69 8092 Zürich SWITZERLAND |
Telefon | +41 44 632 34 96 |
verena.zimmermann@gess.ethz.ch | |
URL | https://spg.ethz.ch/ |
Departement | Geistes-, Sozial- und Staatswissenschaften |
Beziehung | Assistenzprofessorin (Tenure Track) |
Nummer | Titel | ECTS | Umfang | Dozierende | |||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
851-0252-04L | Behavioral Studies Colloquium ![]() | 0 KP | 2K | C. Hölscher, U. Brandes, D. Helbing, M. Kapur, C. Stadtfeld, E. Stern, V. Zimmermann | |||||||||||||||||||||||||||||
Kurzbeschreibung | This colloquium offers an opportunity to discuss recent and ongoing research and scientific ideas in the behavioral sciences, both at the micro- and macro-levels of cognitive, behavioral and social science. The colloquium features invited presentations from internal and external researchers as well as presentations of doctoral students close to submitting their dissertation research plan. | ||||||||||||||||||||||||||||||||
Lernziel | Participants are informed about recent and ongoing research in different branches of the behavioral sciences. Presenting doctoral students obtain feedback on their dissertation research plan. | ||||||||||||||||||||||||||||||||
Inhalt | This colloquium offers an opportunity to discuss recent and ongoing research and scientific ideas in the behavioral sciences, both at the micro- and macro-levels of cognitive, behavioral and social science. It covers a broad range of areas, including theoretical as well as empirical research in social psychology, research on higher education, sociology, modeling and simulation in sociology, decision theory and behavioral game theory, economics, research on learning and instruction, cognitive psychology and cognitive science. The colloquium features invited presentations from internal and external researchers as well as presentations of doctoral students close to submitting their dissertation research plan. | ||||||||||||||||||||||||||||||||
Voraussetzungen / Besonderes | Doctoral students in D-GESS can obtain 1 credit point for presenting their research in the colloquium. | ||||||||||||||||||||||||||||||||
851-0390-00L | Human-Centered IT Security and Privacy ![]() | 3 KP | 2G | V. Zimmermann | |||||||||||||||||||||||||||||
Kurzbeschreibung | Students will gain an overview of the role of the human in security and privacy, learn about the relevance of human-centered design and important psychological aspects. Selected security- and privacy-related application scenarios will be presented and discussed. Furthermore, practical exercises and group work activities are used to showcase human-related aspects and foster reflection. | ||||||||||||||||||||||||||||||||
Lernziel | Students will know about the historical development of human-centered security, relevant psychological aspects and selected practical applications. The course will enable students to critically reflect on human aspects of existing security and privacy technologies and to include a human-centered perspective in the design of new solutions, e.g. by using suitable design and evaluation tools. | ||||||||||||||||||||||||||||||||
Inhalt | First, the course will describe the historical development of usable and human-centered security and privacy, respectively. Using exemplary application scenarios, the relevance of the human in security and privacy will be highlighted and the current role of the human will be reflected on. Second, the human factor will be focused on. The course will address the basic psychological aspects that are relevant for human-centered design including insights from human perceptions, cognition and behavior. Afterwards, the human-centered design process and relevant concepts such as usability and user experience will be introduced. Finally, exemplary methods for the human-centered design and evaluation of will be presented and discussed. Third, practical scenarios across the range of security- and privacy-related topics will be used to illustrate human-centered design processes, evaluation tools and outcomes, e.g., human-centered security technologies or interfaces. Furthermore, these solutions will be discussed within a larger societal context, e.g., with regards to accessibility, ethical considerations, or legal aspects. An external guest lecture will complement the lecture by providing insights from ongoing research in the area of human-centered IT security and privacy. Across all three parts of the course, practical exercises, the exemplary application of methods or tools, and structured discussions involving different perspectives will be used to make the human factor graspable, to enable a change in perspective and to foster reflection. | ||||||||||||||||||||||||||||||||
Literatur | Adams, A., & Sasse, M. A. (1999). Users are not the enemy. Communications of the ACM, 42(12), 40-46. Cranor, L. F., & Garfinkel, S. (2005). Security and usability: designing secure systems that people can use. " O'Reilly Media, Inc.". Reuter, C. (2018). Sicherheitskritische Mensch-Computer-Interaktion. Wiesbaden: Springer Fachmedien Wiesbaden. | ||||||||||||||||||||||||||||||||
Voraussetzungen / Besonderes | The course is particularly suitable for all students with an engineering or computer science-related background. However, students from all disciplines are welcome. No prior knowledge in computer science or psychology is required. | ||||||||||||||||||||||||||||||||
Kompetenzen![]() |
|