Description | Readings | Schedule | Requirements | |
Fall 2009: NSH 3002, Tuesdays and thursdays 3-4:20 pm
Class web site: http://cups.cs.cmu.edu/courses/ups-fa09/
Class mailing list: http://cups.cs.cmu.edu/mailman/listinfo/ups
Students in this course may also be interested in joining the CUPS mailing list.
This course does not use Blackboard.
Professor: Lorrie Cranor
There is growing recognition that technology alone will not provide all of the solutions to security and privacy problems. Human factors play an important role in these areas, and it is important for security and privacy experts to have an understanding of how people will interact with the systems they develop. This course is designed to introduce students to a variety of usability and user interface problems related to privacy and security and to give them experience in designing studies aimed at helping to evaluate usability issues in security and privacy systems. The course is suitable both for students interested in privacy and security who would like to learn more about usability, as well as for students interested in usability who would like to learn more about security and privacy. Much of the course will be taught in a graduate seminar style in which all students will be expected to do a weekly reading assignment and each week different students will prepare a presentation for the class. Students will also work on a group project throughout the semester.
Readings will be assigned from the following text (available in the CMU bookstore and from all the usual online stores). Additional readings will be assigned from papers available online or handed out in class.
Additional readings will be assigned from the course reading list. Most of these readings are in papers available online. In cases where a subscription is required for access, access should be available for free when you are coming from a CMU IP address (on campus or via CMU VPN).
Note, this is subject to change. The class web site will have the most up-to-date version of this calendar.
Date |
Topics |
AssignmentTo be done before coming to class |
Tuesday, August 25 |
Course overview and introductions |
|
Thursday, August 27 |
A Framework for Reasoning About the Human in the Loop [slides]
|
Required reading:
Optional reading: Motivation, models, and approaches |
Tuesday, September 1 |
Introduction to HCI methods and UI design [slides]
|
Required reading:
Optional reading: Motivation, models, and approaches |
Thursday, September 3 |
Designing experiments [slides]
|
Required reading:
Optional reading: HCI methods and experimental design Homework 1 due - Reading summaries from 8/27, 9/1, 9/3; complete human subjects training and submit certificate [+ summary of 1 optional reading] |
Tuesday, September 8 |
Introduction to security
|
Required reading:
Optional reading: Security and threat modeling |
Thursday, September 10 |
Threat modeling
|
Required reading:
Optional reading: Security and threat modeling Homework 2 due - Reading summaries from 9/8, 9/10 [+ summary of 1 optional reading] |
Tuesday, September 15 |
Surveys, interviews, and focus groups [slides] |
Required reading:
Optional reading: HCI methods and experimental design |
Thursday, September 17 |
Observing users in the field [slides] |
Required reading:
Optional reading: HCI methods and experimental design Homework 3 due - Reading summaries from 9/15, 9/17 [+ summary of 1 optional reading] |
Tuesday, September 22 |
Privacy by design [slides] (note this was originally scheduled for Sept 29) |
Required reading:
Optional reading: HCI methods and experimental design |
Thursday, September 24 |
Project group formation |
If you have an idea for a project, come to class prepared to pitch it to your classmates. Homework 4 due - Reading summaries from 9/22, observations report [+ summary of 1 optional reading] |
Tuesday, September 29 |
Laboratory studies (Note this was originally scheduled for Sept 22) |
Required reading:
Optional reading: Privacy |
Thursday, October 1 |
Privacy and mobile and ubiquitous computing [student presentations - T. Christian] [slides] |
Required reading:
Optional reading: Privacy in mobile and ubiquitous computing Homework 5 due - Reading summaries from 9/29, 10/1 [+ summary of 1 optional reading] |
Tuesday, October 6 |
Privacy policies [student presentations - P. Kelley] [slides] |
Required reading:
Optional reading: Privacy policies One-page project proposal due |
Thursday, October 8 |
Privacy software [student presentations - I. Adjerid] |
Required reading:
Optional reading: Privacy Homework 6 due - Reading summaries from 10/6, 10/8 [+ summary of 1 optional reading] |
Tuesday, October 13 |
Web browser privacy and security [student presentations - N. Li, G. Norcie, J. Salk] [Li slides] [Salk slides] [Norcie slides] |
Required reading:
Optional reading: Web browser privacy and security |
Thursday, October 15 |
Security warnings [student presentations - C. Bravo-Lillo] [slides] |
Required reading:
Optional reading: Warnings Homework 7 due - Reading summaries from 10/13, 10/15 [+ summary of 1 optional reading] |
Tuesday, October 20 |
Trust and semantic attacks [student presentations - H. Takabi, Y. Liao] [Takabi slides] [Liao slides] |
Required reading:
Optional reading: Trust and semantic attacks |
Thursday, October 22 |
User education [student presentations - M. Koushik] |
Optional reading: User education, Teaching Johnny Not to Fall for Phish Homework 8 due - Reading summaries from 10/20, 10/22 [+ summary of 1 optional reading] |
Tuesday, October 27 |
Authentication, access control, and policy configuration [slides] |
Required reading:
Optional reading: Authentication |
Thursday, October 29 |
Access control and policy configuration [student presentations - M. Mazurek] [slides] |
Required reading:
Optional reading: Access control and policy management Homework 9 due - Reading summaries from 10/27, 10/29 [+ summary of 1 optional reading] |
Tuesday, November 3 [election day] |
Policy management
|
Required reading:
Optional reading: Access control and policy management |
Thursday, November 5 |
Text passwords [student presentations - R. Shay] [slides] |
Required reading:
Optional reading: Authentication Homework 10 due - Reading summaries from 11/3, 11/5 [+ summary of 1 optional reading] |
Tuesday, November 10 |
Progress report presentations |
Progress reports due |
Thursday, November 12 |
Progress report presentations |
Required reading: |
Tuesday, November 17 |
Graphical passwords [student presentations - S. Komanduri] [slides] |
Required reading:
Optional reading: Authentication |
Thursday, November 19 |
Biometrics [student presentations - J. Debner, B. Kennedy, C. Hartman] [Kennedy slides][Debner slides][Hartman slides] |
Required reading:
Optional reading: Authentication Homework 11 due - Reading summaries from 11/12, 11/17, 11/19 [+ summary of 1 optional reading] |
Tuesday, November 24 |
Tools for security administration [student presentations - P. Klemperer] |
Required reading:
Optional reading: Tools for security administration |
Thursday, November 26 |
Thanksgiving break, no class |
|
Tuesday, December 1 |
PKIs and secure communication [student presentations - B. Pendleton] |
Required reading:
Optional reading: PKIs and secure communication Homework 12 due - Reading summaries from 11/24, 12/1 [+ summary of 1 optional reading] |
Thursday, December 3 |
no class |
This class will have no final exam, however, the final exam period December 15, 8:30-11:30 am in GHC5222, will be used for final project presentations. Since we don't actually need a full 3 hours, we'll start at 9 am. Breakfast will be provided. Final project papers will be due at the exam period.
You are responsible for being familiar with the university standard for academic honesty and plagiarism. Please see the CMU Student Handbook for information. In order to deter and detect plagiarism, online tools and other resources are used in this class. Students caught cheating or plagiarizing will receive no credit for the assignment on which the cheating occurred. Additional actions -- including assigning the student a failing grade in the class or referring the case for disciplinary action -- may be taken at the discretion of the instructor.
Your final grade in this course will be based on:
Homework assignments for this class will include reading summaries as well as written assignments. All homework is due in printed form in class at 3:00 pm each Thursday (unless otherwise specified). Homework submitted after 3:15 pm will be considered late. Homework will be graded as check-plus (100%), check (80%), check-minus (60%) or 0. If you turn in a complete assignment but provide no interesting insights you will get a check. To earn a check-plus requires that you complete the assignment and demonstrate you have put some thought into your homework. Late homework will receive one grade lower than it would have otherwise received if it is submitted no later than at the beginning of the next class meeting (after that it will not be accepted). Your two lowest homework grades will be dropped from your homework average.
Students are expected to do reading assignments prior to class so that they can participate fully in class discussions. Students must submit a short summary (3-8 sentences) and a "highlight" for each chapter or article in the reading assignment. The highlight may be something you found particularly interesting or noteworthy, a question you would like to discuss in class, a point you disagree with, etc.
Students in 08-734 and 05-836 are expected to include a summary and highlight for one optional reading of their choice each week. All other students are encouraged to review some of the optional readings that they find interesting, but they need not submit summaries or highlights of the optional readings.
Each student will be assigned a class lecture to prepare and present. The lecture should be based on the topics covered in that week's reading assignment, but it should go beyond the materials in the required reading. Do not present a lecture that simply summarizes the assigned reading. For example, you might read and present some of the related work mentioned in the reading or that you find on your own (the HCISec Bibliography is a good starting point for finding papers), you might present some of the relevant optional reading materials (feel free to use relevant materials from other weeks), you might demonstrate software mentioned in the reading, you might critique a design discussed in the reading, or you might design a class exercise for your classmates. If the material you present describes a user study, include a detailed description and critique of the study design. As part of your lecture you should prepare several discussion questions and lead a class discussion. You should also introduce your fellow students to terminology and concepts they might not be familiar with that are necessary to understand the material you are presenting. You should email to the instructor a set of PowerPoint slides including lecture notes and discussion questions. These slides will be posted on the class web site. In addition, the instructor may include all or part of your presentation slides and notes in an instructor's guide for future usable privacy and security courses.
Students in 08-734 and 05-836 will be assigned a time slot of 40-80 minutes for their lecture presentation. Students in 08-534 and 05-436 will be assigned a time slot of no more than 30 minutes.
Students will work on semester projects in small groups that include students with a variety of areas of expertise. Each project group will propose a project. It is expected that most projects will involve the design of a user study to evaluate the design of an existing or proposed privacy- or security-related system or gain insight into users' attitudes or mental models related to some aspect of security or privacy. Groups with ideas for other types of projects should discuss them with the instructor before submitting their project proposals. As part of the project students will:
Students are encouraged to submit their project to the Symposium On Usable Privacy and Security as either a paper or poster. A paper submission will likely require some additional work after the end of the semester. To submit a poster will require only submitting a 2-page abstract. The instructor will provide funds for one student from each project team to attend the SOUPS conference if their paper or poster is accepted.
Students signed up for 05-836 and 08-734 are expected to play a leadership role in a project group and write a project paper suitable for publication. Unless your group has only 08-534 and 05-436 students in it, that means your final paper should be written in a style suitable for publication at a conference or workshop. The conference papers in the optional readings provide some good examples of what a conference paper looks like and the style in which they are written. In addition to describing what you did in your study, your paper should include a related work section and properly-formatted references. Papers should follow the SOUPS 2009 technical papers formatting instructions, but you may include appendixes that exceed the 12 page limit and do not follow the SOUPS formatting guidelines (indeed, your required appendixes should exceed this limit). If you have identified an alternative relevant conference and would prefer to use that conference's submission format for your paper, please discuss it with the instructor.