851-0390-00L  Human-Centered IT Security and Privacy

SemesterFrühjahrssemester 2023
DozierendeV. Zimmermann
Periodizitätjährlich wiederkehrende Veranstaltung
LehrspracheEnglisch



Lehrveranstaltungen

NummerTitelUmfangDozierende
851-0390-00 GHuman-Centered IT Security and Privacy2 Std.
Do10:15-12:00HG G 26.5 »
V. Zimmermann

Katalogdaten

KurzbeschreibungStudents will gain an overview of the role of the human in security and privacy, learn about the relevance of human-centered design and important psychological aspects. Selected security- and privacy-related application scenarios will be presented and discussed. Furthermore, practical exercises and group work activities are used to showcase human-related aspects and foster reflection.
LernzielStudents will know about the historical development of human-centered security, relevant psychological aspects and selected practical applications. The course will enable students to critically reflect on human aspects of existing security and privacy technologies and to include a human-centered perspective in the design of new solutions, e.g. by using suitable design and evaluation tools.
InhaltFirst, the course will describe the historical development of usable and human-centered security and privacy, respectively. Using exemplary application scenarios, the relevance of the human in security and privacy will be highlighted and the current role of the human will be reflected on.
Second, the human factor will be focused on. The course will address the basic psychological aspects that are relevant for human-centered design including insights from human perceptions, cognition and behavior. Afterwards, the human-centered design process and relevant concepts such as usability and user experience will be introduced. Finally, exemplary methods for the human-centered design and evaluation of will be presented and discussed.
Third, practical scenarios across the range of security- and privacy-related topics will be used to illustrate human-centered design processes, evaluation tools and outcomes, e.g., human-centered security technologies or interfaces. Furthermore, these solutions will be discussed within a larger societal context, e.g., with regards to accessibility, ethical considerations, or legal aspects.
An external guest lecture will complement the lecture by providing insights from ongoing research in the area of human-centered IT security and privacy.
Across all three parts of the course, practical exercises, the exemplary application of methods or tools, and structured discussions involving different perspectives will be used to make the human factor graspable, to enable a change in perspective and to foster reflection.
LiteraturAdams, A., & Sasse, M. A. (1999). Users are not the enemy. Communications of the ACM, 42(12), 40-46.

Cranor, L. F., & Garfinkel, S. (2005). Security and usability: designing secure systems that people can use. " O'Reilly Media, Inc.".

Reuter, C. (2018). Sicherheitskritische Mensch-Computer-Interaktion. Wiesbaden: Springer Fachmedien Wiesbaden.
Voraussetzungen / BesonderesThe course is particularly suitable for all students with an engineering or computer science-related background.

However, students from all disciplines are welcome. No prior knowledge in computer science or psychology is required.
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengefördert
Verfahren und Technologiengeprüft
Methodenspezifische KompetenzenAnalytische Kompetenzengeprüft
Problemlösunggeprüft
Soziale KompetenzenKommunikationgeprüft
Kooperation und Teamarbeitgeprüft
Sensibilität für Vielfalt gefördert
Persönliche KompetenzenKreatives Denkengefördert
Kritisches Denkengeprüft

Leistungskontrolle

Information zur Leistungskontrolle (gültig bis die Lerneinheit neu gelesen wird)
Leistungskontrolle als Semesterkurs
ECTS Kreditpunkte3 KP
PrüfendeV. Zimmermann
Formbenotete Semesterleistung
PrüfungsspracheEnglisch
RepetitionRepetition nur nach erneuter Belegung der Lerneinheit möglich.
ZulassungsbedingungThe students need to provide a documentation of the results of the exercises conducted throughout the course. The documentation is supposed to capture the students' active engagement with the course topic and the reflection on the human aspect in security- and privacy-related research.

This documentation is not graded but a requirement for taking part in the graded examination.
Zusatzinformation zum PrüfungsmodusThe examination will consist of two parts:
1) The students need to provide a documentation of the results of the exercises conducted in the course. This is the requirement for taking part in part 2.
2) The students will prepare a poster for an interactive poster session in which they present a current article from the area of human-centered IT security and privacy. The grade for the course will be formed based on the poster and the related presentation.

Lernmaterialien

Keine öffentlichen Lernmaterialien verfügbar.
Es werden nur die öffentlichen Lernmaterialien aufgeführt.

Gruppen

Keine Informationen zu Gruppen vorhanden.

Einschränkungen

PlätzeMaximal 50
WartelisteBis 05.03.2023

Angeboten in

StudiengangBereichTyp
DAS in Cyber SecurityWahlfächerWInformation
Science, Technology, and Policy MasterWahlfächerWInformation
Wissenschaft im Kontext (Science in Perspective)PolitologieWInformation
Wissenschaft im Kontext (Science in Perspective)D-HESTWInformation
Wissenschaft im Kontext (Science in Perspective)D-INFKWInformation
Wissenschaft im Kontext (Science in Perspective)D-ITETWInformation
Wissenschaft im Kontext (Science in Perspective)D-MTECWInformation
Wissenschaft im Kontext (Science in Perspective)D-MAVTWInformation