Course calendar

Subject to change

Please keep in mind that the schedule may change as the course progresses, so please regularly check the course website for any changes.

Week Day Date Class Lecture Discussion Reading Due
0 Thu 1/18 1 - Usable security overview
Security None
1 Mon 1/22 2 - Privacy and context Privacy mental models
- (Optional) Renaud et al. Why Doesn’t Jane Protect Her Privacy?
Thu 1/25 3 - Introduction to usability
None H1: ethics
2 Mon 1/29 4 - Usable encryption
- Methods: cognitive walkthroughs
- Usable encryption Whitten and Tygar, Why Johnny Can’t Encrypt P1: project ideas
Thu 2/1 5 - Methods: user studies - Passwords Ur et al., “I Added ‘!’ at the End to Make It Secure”: Observing Password Creation in the Lab
3 Mon 2/5 6 - Two-factor authentication
- Two-factor authentication
- Password alternatives
Reese et al., A Usability Study of Five Two-Factor Authentication Methods P2: project groups
Tue 2/6 H2: cognitive walkthrough
Thu 2/8 7 - Reflections: cognitive walkthrough
- Password managers
Pearman et al., Why people (don’t) use password managers effectively
4 Mon 2/12 8 - Methods: interviews Phishing prevention - Petelka et al., Put Your Warning Where Your Link Is: Improving and Evaluating Email Phishing Warnings
- (Optional) Egelman et al., You’ve Been Warned: An Empirical Study of the Effectiveness of Web Browser Phishing Warnings
Thu 2/15 9 - Methods: qualitative analysis
Security warnings and indicators - Felt et al., Improving SSL Warnings: Comprehension and Adherence
- (Optional) Kaiser et al., Adapting Security Warnings to Counter Online Disinformation
5 Mon 2/19 10 - Methods: surveys Mobile permissions Cao et al., A Large Scale Study of User Behavior, Expectations and Engagement with Android Permissions
Tue 2/20 P3: project related work
Thu 2/22 11 - Methods: statistics Breach and compliance notifications Stock et al., Didn’t You Hear Me? - Towards More Successful Web Vulnerability Notifications
6 Mon 2/26 12 - Methods: experiment design and validity Privacy in social media TBA
Tue 2/27 P4: project proposal
Thu 2/28 13 Privacy policies TBA
7 Mon 3/4 14 Online tracking TBA
Tue 3/5 P5: project methods
Thu 3/7 15 - Reflections: interview
- Usable anonymity
TBA
8 Mon 3/11 Spring Break
Thu 3/14 Spring Break
9 Mon 3/18 16 - How-to: writing a paper (overview) Smart home privacy TBA H3: user study
Thu 3/21 17 - How-to: writing related work AR/VR privacy
TBA
10 Mon 3/25 18 - How-to: writing methods section Deceptive design patterns TBA
Tue 3/26 H4: interview
Thu 3/28 19 - How-to: writing results - Reflections: survey
- Security professionals
TBA
11 Mon 4/1 20 - How-to: writing the discussion Software developers TBA P6: project progress report
Tue 4/2 H5: survey
Thu 4/4 21 - How-to: writing the introduction Vulnerable populations TBA
12 Mon 4/8 22 Guest lecture
Tue 4/9 H6: design exercise
Thu 4/11 23 Accessibility TBA
13 Mon 4/15 24 Children and teens TBA
Thu 4/18 25 Older adults TBA
14 Mon 4/22 26 - How-to: giving a research talk
International & multicultural perspectives TBA
Thu 4/25 27 Project work period
15 Mon 4/29 28 Final project presentations P7: project final presentations
Thu 5/2 Reading day
16 Mon 5/6 Exam week P8: project final report
Thu 5/9 Exam week