Lecture Recordings
All lecture recordings should be accessed via Learn; you will need to log in using your EASE account. (Learn provides you with access to any lecture recordings available for this course. You will need to select the "lecture recording" link once, before you can access any direct links to a lecture recording.)
Lecture Schedule
Introduction
In this theme, we will first give an overview on the course structure and introduce basic concepts in usable security and privacy. Then, we will discuss user authentication, a common security application, in the context of USEC.
- Week 1
- [L1] Introduction to Usable Security and Privacy
- [L2] Usable Security and Privacy Thinking and Threat Modeling
- Week 2
- [L3] User Authentication (Overview and Password)
- [L4] User Authentication (Biometrics)
Study Method and Analysis
Now we will introduce how to conduct (user) studies for USEC. We will also talk about how to formulate USEC research.
- Week 3
- [L5] Study Method Overview
- [L6] Think Aloud Study
- Week 4
- [L7] Survey and Analysis
- [L8] Research Framework and Thinking
Technology and Applications
In this theme, we will evaluate classic security and privacy problems in USEC (many of which are still valid today!), review the state-of-art, and peek at the future.
- Week 5
- [L9] Phishing
- [L10] Access Control
- Week 6
- [L11] PGP Encryption and Email
- [L12] Privacy Overview and Privacy by Design
- Week 7
- [L13] IoT Privacy
- [L14] USEC & Artificial Intelligence
- Week 8
- [L15] Security and Privacy Warnings
- [L16] Security and Privacy Advice
Regulations and Ethics
Lastly, we will cover the legal implications and ethical practices in USEC, which is essential for protecting ourselves and vulnerable users.
- Week 9
- [L17] Ethics
- [L18] USEC for Vulnerable People
- Week 10
- [L19] Consent and Privacy Policy
- [L20] Privacy Law
Coursework
TBA