| Abstract | After an introduction on usable security as the intersection of computer science and psychology, students will form teams and work on exemplary security- or privacy-related research questions. The teams will develop and evaluate a concept for a human-centered solution. Through input sessions and milestone presentations the human perspective will be incorporated and reflected upon. |
| Learning objective | The course makes students experience an exemplary human-centered design process. They will learn about and practically apply human-centered design and evaluation methods that will allow them to view their solution from the human perspective, e.g., the user, developer or website owner perspective. By taking part in the evaluation of other teams, they will also take the user perspective themselves. |
| Content | At the beginning of the course, the students will receive an introduction to usable IT security and privacy and relevant concepts. Afterwards, a selection of current research questions from that area will be presented. The students form teams and select one of the proposed research questions. This question will accompany the students throughout the semester. They will design and evaluate a concept for a human-centered solution to that question. To be able to do so, they will receive input on human-centered design and evaluation tools. Their progress and the inclusion of the human perspective will be subject to feedback in milestone presentations. The students’ human-centered solution can take the form of a concept (e.g., a concept for a product or app), interface (e.g., a visual or tangible interface), or prototype (e.g., sketches, a click-dummy or a built prototype). The solution will then be subject to evaluations. The solutions will be user-tested by members of other teams that thereby take the perspective of a user themselves. In addition, the solutions will be analyzed from different stakeholders’ perspectives, such as developers or website owners. Finally, the students will reflect on potential changes that results from the evaluations and their consequences. |
| Literature | Literature Recommendations:
Adams, A., & Sasse, M. A. (1999). Users are not the enemy. Communications of the ACM, 42(12), 40-46. Cranor, L. F., & Garfinkel, S. (2005). Security and usability: designing secure systems that people can use. " O'Reilly Media, Inc.". Diefenbach, S., & Hassenzahl, M. (2017). Psychologie in der nutzerzentrierten Produktgestaltung: Mensch-Technik-Interaktion-Erlebnis. Springer-Verlag. Diefenbach, S., & Hassenzahl, M. (2010). Handbuch zur Fun-ni Toolbox–User Experience Evaluation auf drei Ebenen. Dix, A., & Finlay, J., Abowd, G., Beale, R. (2004). Human-computer interaction. Pearson - PRENTICE HALL. Garfinkel, S., & Lipford, H. R. (2014). Usable security: History, themes, and challenges. Synthesis Lectures on Information Security, Privacy, and Trust, 5(2), 1-124. Nielsen, J. (1999). Designing web usability: The practice of simplicity. New Riders Publishing. Norman, D. (2013). The design of everyday things: Revised and expanded edition. Basic Books (AZ). Reuter, C. (2018). Sicherheitskritische Mensch-Computer-Interaktion. Wiesbaden: Springer Fachmedien Wiesbaden. Sarodnick, F., & Brau, H. (2006). Methoden der Usability Evaluation. Verlag Hans Huber. |
| Prerequisites / Notice | This course is especially recommended after the related lecture "851-0390-00 G Human-Centered IT Security and Privacy". However, previous participation in the lecture is not a requirement and not necessary for succeeding in the course. |
Competencies | | Subject-specific Competencies | Concepts and Theories | assessed | | Method-specific Competencies | Analytical Competencies | assessed | | Decision-making | assessed | | Media and Digital Technologies | fostered | | Problem-solving | assessed | | Project Management | assessed | | Social Competencies | Communication | fostered | | Cooperation and Teamwork | assessed | | Customer Orientation | fostered | | Sensitivity to Diversity | fostered | | Personal Competencies | Adaptability and Flexibility | fostered | | Creative Thinking | fostered | | Critical Thinking | fostered | | Integrity and Work Ethics | fostered | | Self-awareness and Self-reflection | assessed | | Self-direction and Self-management | fostered |
|