USEC: Lecture 5: Study Methods
Lecture Slides
See attached file
Materials
Reading for the lecture:
- Whitten, A. and Tygar, J.D., 1999, August. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. In USENIX security symposium (Vol. 348, pp. 169-184).
Take-home
- (Blog) Zhang, Z., Jia, M., Lee, H.P., Yao, B., Das, S., Lerner, A., Wang, D. and Li, T., 2024. " It’s a Fair Game", or Is It? Examining How Users Navigate Disclosure Risks and Benefits When Using LLM-Based Conversational Agents. In Proceedings of the CHI Conference on Human Factors in Computing Systems, CHI 2024, Honolulu, HI, USA, May 11-16, 2024 (pp. 156-1). ACM.
(Blog) Reuters - DeepSeek hit by cyberattack as users flock to Chinese AI startup
Reference
- Lazar, J., Feng, J.H. and Hochheiser, H., 2017. Research methods in human-computer interaction. Morgan Kaufmann.
License
All rights reserved The University of Edinburgh