Instructor: | Habiba Farrukh |
Credits: | 4 |
Lectures: | TuTh 2:00 - 3:20 PM, DBH 1300 |
Class space: | Canvas |
Office hours: |
By appointment |
Course Description
The increasing security and privacy incidents, including phishing, identity thefts, and attacks on consumer smart devices, highlight the growing need to establish a continuous and in-depth understanding of users’ critical and undeniable role in these situations. This course will examine how to design for security and privacy from a user-centered perspective by combining insights from computer systems and human-centered computing. The course will explore several challenges in integrating usability into core security and privacy systems design and introduce techniques to address these challenges. Topics will include usable authenti- cation, user-centered web security, anonymity software, privacy notices and nudges, security warnings, and data-driven privacy tools in domains ranging from social media to the Internet of Things.
Although there are no hard requirements, the course is most suitable for students with a technical background (e.g., an undergraduate computer programming course).
Grading
There will be no exams. Instead, the grade will be based on the following:Reading Summaries (10%) – For most sessions, students are expected to read and submit a thoughtful commentary on the readings assigned for the sessions. The summaries will be due at 11:59 pm PDT before each class via Canvas Assignments. Please find out more details here.
Homeworks (10%) – There will be a few written homeworks.
Active class participation (10%) - All students are expected to fully participate in all class activities to gain the most benefits from the class. Students should come to class prepared to discuss any assigned readings and provide their perspectives on these readings. Students are also expected to participate in group discussions and other in-class activities. The effectiveness of the course depends on the quality of student participation, willingness to internalize the skills and concepts covered in the course, and efforts to apply them to real-world settings.
Paper presentation and discussion lead (20%) – Depending on the number of students enrolled, each student is expected to sign up to lead the discussion for one of the assigned readings in one session. The discussion lead in a session will not be expected to submit the reading summaries for that session. Please find out more details about the discussion lead's tasks here.
Research Project (50%) – Throughout the course, students will work in small groups (up to 4 students) to conduct a research project. Students will have the option to choose from a list of potential project topics or propose their own research idea after discussion with the instructor. At the end of the course, students will write a research report on the project (publishable in a security and privacy workshop/conference) and present their progress to the class. Students are encouraged to submit their research as a full paper or a poster to a security and privacy (e.g., IEEE S&P, USENIX) venue. Submitting a full paper to these venues requires additional work beyond the quarter. The instructor will mentor students interested in continuing their research projects and submitting them to the appropriate venues. Please find out more details about project guidelines and deliverables here.
Schedule
The tentative list of topics and schedule is given below. The topics and the weeks in which they are presented might change in the future. Please check back here frequently.
Most papers should be publicly accessible online. If any links are broken below, please notify the instructor. If accessing any papers requires a paid subscription, you can access them for free on-campus by connecting to campus WiFi. For off-campus access, please try UCI VPN.
Week | Date | Topic | Assignment |
---|---|---|---|
Week 1 | 09/26/2024 | Course Introduction | |
Week 2 | 10/01/2024 | Usable Security and Privacy | Homework 0 Due |
10/03/2024 | Usability Design and Experiments | ||
Week 3 | 10/08/2024 | IRB & Recruitment | |
10/10/2024 | Quantitative Analysis Methods | ||
Week 4 | 10/15/2024 | Qualitative Analysis Methods | |
10/17/2024 | Project Proposal Presentations | ||
Week 5 | 10/22/2024 | Security and Privacy of At-Risk Groups | Project Proposals Due |
10/24/2024 | Access Control and Authentication | ||
Week 6 | 10/29/2024 | Security and Privacy Nudges and Warnings | |
10/31/2024 | Accessibility in Security and Privacy | ||
Week 7 | 11/05/2024 | Deceptive Patterns in Security and Privacy | Homework 1 Due |
11/07/2024 | Usable Security for Extended Reality | ||
Week 8 | 11/12/2024 | Usable Security for AI-Enabled Technologies | |
11/14/2024 | Usable Security for Developers | ||
Week 9 | 11/19/2024 | Project Checkin | Homework 2 Due |
11/21/2024 | Emerging Topics in Usable Security and Privacy | ||
Week 10 | 11/26/2024 | Emerging Topics in Usable Security and Privacy | |
11/28/2024 | Thanksgiving - No Class | ||
Week 11 | 12/03/2024 | Project Presentations | |
12/05/2024 | Project Presentations | ||
Week 12 | 12/11/2024 | Project Final Reports Due |
Academic Integrity
Learning, research, and scholarship depend upon an environment of academic integrity and honesty. This environment can be maintained only when all participants recognize the importance of upholding the highest ethical standards. All student work, including quizzes, exams, reports, and papers, must be the work of the individual receiving credit. Academic dishonesty includes, for example, cheating on examinations or any assignment, plagiarism of any kind (including improper citation of sources), having someone else take an examination or complete an assignment for you (or doing this for someone else), or any activity in which you represent someone else’s work as your own. Violations of academic integrity will be referred to the Office of Academic Integrity and Student Conduct. The impact on your grade will be determined by the individual instructor’s policies. Please familiarize yourself with UCI’s Academic Integrity Policy and speak to the instructor if you have any questions about what is and is not allowed in this course.
Ethics Statement
This course considers topics involving personal and public privacy and security. As part of this class, we will cover technologies whose abuse may infringe on the rights of others. As an instructor, I rely on the ethical use of these technologies. Unethical use may include circumvention of existing security or privacy measurements for any purpose or the dissemination, promotion, or exploitation of vulnerabilities of these services. Exceptions to these guidelines may occur in the process of reporting vulnerabilities through public and authoritative channels. Any activity outside the letter and spirit of these guidelines will be reported to the proper authorities and may result in dismissal from the class and expulsion from the university.
When in doubt, please contact the instructor for advice. Do not undertake any action that could be perceived as technology misuse anywhere and/or under any circumstances unless you have received explicit permission from the instructor.