| Abstract | Students will gain an overview of the role of the human in security and privacy, learn about the relevance of human-centered design and important psychological aspects. Selected security- and privacy-related application scenarios will be presented and discussed. Furthermore, practical exercises and group work activities are used to showcase human-related aspects and foster reflection. |
| Learning objective | Students will know about the historical development of human-centered security, relevant psychological aspects and selected practical applications. The course will enable students to critically reflect on human aspects of existing security and privacy technologies and to include a human-centered perspective in the design of new solutions, e.g. by using suitable design and evaluation tools. |
| Content | First, the course will describe the historical development of usable and human-centered security and privacy, respectively. Using exemplary application scenarios, the relevance of the human in security and privacy will be highlighted and the current role of the human will be reflected on. Second, the human factor will be focused on. The course will address the basic psychological aspects that are relevant for human-centered design including insights from human perceptions, cognition and behavior. Afterwards, the human-centered design process and relevant concepts such as usability and user experience will be introduced. Finally, exemplary methods for the human-centered design and evaluation of will be presented and discussed. Third, practical scenarios across the range of security- and privacy-related topics will be used to illustrate human-centered design processes, evaluation tools and outcomes, e.g., human-centered security technologies or interfaces. Furthermore, these solutions will be discussed within a larger societal context, e.g., with regards to accessibility, ethical considerations, or legal aspects. An external guest lecture will complement the lecture by providing insights from ongoing research in the area of human-centered IT security and privacy. Across all three parts of the course, practical exercises, the exemplary application of methods or tools, and structured discussions involving different perspectives will be used to make the human factor graspable, to enable a change in perspective and to foster reflection. |
| Literature | Adams, A., & Sasse, M. A. (1999). Users are not the enemy. Communications of the ACM, 42(12), 40-46.
Cranor, L. F., & Garfinkel, S. (2005). Security and usability: designing secure systems that people can use. " O'Reilly Media, Inc.".
Reuter, C. (2018). Sicherheitskritische Mensch-Computer-Interaktion. Wiesbaden: Springer Fachmedien Wiesbaden. |
| Prerequisites / Notice | The course is particularly suitable for all students with an engineering or computer science-related background.
However, students from all disciplines are welcome. No prior knowledge in computer science or psychology is required. |
Competencies | | Subject-specific Competencies | Concepts and Theories | fostered | | Techniques and Technologies | assessed | | Method-specific Competencies | Analytical Competencies | assessed | | Problem-solving | assessed | | Social Competencies | Communication | assessed | | Cooperation and Teamwork | assessed | | Sensitivity to Diversity | fostered | | Personal Competencies | Creative Thinking | fostered | | Critical Thinking | assessed |
|