USEC: Course Materials
Lecture Recordings
All lecture recordings should be accessed via Learn; you will need to log in using your EASE account. (Learn provides you with access to any lecture recordings available for this course. You will need to select the "lecture recording" link once, before you can access any direct links to a lecture recording.)
Lecture Schedule
Introduction
In this theme, we will first give an overview on the course structure and introduce basic concepts in usable security and privacy. Then, we will discuss user authentication, a common security application, in the context of USEC.
- Week 1
- [L1] Introduction to Usable Security and Privacy
- [L2] Usable Security and Privacy Thinking and Threat Modeling
- Week 2
- [L3] User Authentication (Overview and Password)
- [L4] User Authentication (Biometrics) -> rescheduled due to weather condition
Study Method and Analysis
Now we will introduce how to conduct (user) studies for USEC. We will also talk about how to formulate USEC research.
- Week 3
- [L4] User Authentication (Biometrics)
- [L5] Study Method Overview
- Week 4
- [L6] Think Aloud Study
- [L7] Survey and Analysis
Technology and Applications
In this theme, we will evaluate classic security and privacy problems in USEC (many of which are still valid today!), review the state-of-art, and peek at the future.
- Week 5
- [L8] Analysis continued
- [L9] Research Framework and Thinking
- Week 6
- [L10] Research Framework (continued) and Privacy
- [L11] Access Control
- Week 7
- [L12] Online Scams and Phishing
- [L13] Security Warning and Advice
- Week 8
- [L14] IoT Privacy and Security
- [L15] AI S&P Overview
Regulations and Ethics
Lastly, we will cover the legal implications and ethical practices in USEC, which is essential for protecting ourselves and vulnerable users.
- Week 9
- [L16] Human Factors in Vulnerability Research
- [L17] Ethics
- Week 10
- [L18] At-Risk Users
- [L19] Consent and Privacy Policy
- Week 11
- [L20] Privacy Law
- [L21] Revision
Coursework
Information on Learn