T-110.5220 Information Security and Usability P (3 cr)

Additional reading


1st lecture: Background

2nd lecture: The classics:

Adams and Sasse: Users are not the enemy

Good and Krekelberg: Usability and privacy: a study of Kazaa P2P file-sharing

Tygar and Whitten: Why Johnny Can't Encrypt

3rd lecture: Recent work in usable security

 

 

 Additional reading (voluntary):

Cranor et al: Beyond Concern:  Understanding Net Users' Attitudes About Online Privacy

Cheskin: eCommerce Trust Study

Nielsen: Trust or Bust: Communicating Trustworthiness in Web Design

Norman: When Security Gets in the Way

Schehter et al: The Emperor's New Security Indicators

Smetters and Good: How Users Use Access Control

Ackerman et al: Privacy Issues and Human-Computer Interaction

Dhamija: Why Phishing Works

Chiasson et al: A Second Look at the Usability of Click-Based Graphical Passwords. Symposium On Usable Privacy and Security

Camp: Mental models of privacy and security

Lindgaard: Attention Web Designers: You have 50 milliseconds to make a good first impression!

Older version of the course can be found 

http://www.cse.tkk.fi/en/studies/T-110.5220/ 

Updated 18 Jan 12 at 13:58