Uni-Siegen
17. Juli 2017Reading class on selected topics in HCI User Centered Security and Privacy
• Schedule and list of papers we want to discuss No. Date Topic Reading 1 21.10. Introduction Overview of privacy stances and fundamental concepts 1 28.10. Privacy in HCI Iachello, G. and Hong, J. End-user privacy in human-computer interaction. Foundations...
Erstelle deinen persönlichen Lernplan
Wir helfen dir, diesen Kurs optimal vorzubereiten — mit einem individuellen Lernplan, Tipps und passenden Ressourcen.
Jetzt Lernplan erstellen• Schedule and list of papers we want to discuss
No.
Date
Topic
Reading
1
21.10.
Introduction
Overview of privacy stances and fundamental concepts
1
28.10.
Privacy in HCI
Iachello, G. and Hong, J. End-user privacy in human-computer interaction. Foundations and Trends in Human-Computer Interaction 1, 1 (2007), 1–137.
3
3.11.
Privacy in Law
Solove -Conceptualizing Privacy”, California Law Review, 2002
4
10.11.
Privacy in IT-Sec
Danezis & Gürses -A critical review of 10 years of Privacy Technology” Proceedings of Surveillance Cultures: A Global Surveillance Society?, 2010
IT factors: Formal models and Technological approaches
5
17.11.
Measuring Privacy
Kelly, D and Raines, R and Baldwin, R and Grimaila, M and Mullins, B
Exploring Extant and Emerging Issues in Anonymous Networks: A Taxonomy
and Survey of Protocols and Metrics. Communications Surveys & Tutorials, IEEE, 2011
6
24.11.
Privacy by Design
Langheinrich -Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems- In: Ubicomp 2001: Ubiquitous Computing, 273–91. Springer
Human factors: Usability, Socialbility & Privacy practices
7
1.12.
Human factors
Whitten & Tygar -Why Johnny can’t encrypt: A usability evaluation of PGP 5.0.” Proceedings of the 8th USENIX Security Symposium, McGraw-Hill (1999), 16
8
8.12.
Control mechanisms & practices
Stevens & Wulf -Computer-Supported Access Control” ACM ToCHI, 2009
Economical factors: Pay with your personal data
9
15.12
Privacy Paradox
Norberg et al. -The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors-, The Journal of Consumer Affairs, Vol. 41, No. 1, 2007
Acquisti & Loewenstein -What is privacy worth?” - The Journal of Legal Studies, 2013
10
15.1
Privacy & Trust in eCommerce
Gefen et al. -Trust and TAM in Online Shopping: An Integrated Model” MIS Quarterly, Vol. 27, No. 1 2003, pp. 51-90
Balancing factors: Multi lateral privacy & Privacy Scorecards
11
22.1
Multilateral Security
A. Pfitzmann, A. Schill, A. Westfeld, und G. Wolf, -Einleitung-, in Mehrseitige Sicherheit in offenen Netzen, Vieweg+Teubner Verlag, 2000, S. 5–14
12
29.1
Balancing factors
Rost, -Datenschutz in 3D-, Datenschutz Datensicherheit-DuD, Bd. 35, Nr. 5, S. 351–354, 2011.
Stevens et al. Mehrseitige, barrierefreie Sicherheit intelligenter Messsysteme. Datenschutz und Datensicherheit-DuD., 2014
Stevens, Gunnar, Prof. Dr.
Universität Siegen
20142 WiSe 2014/15
Human Computer Interaction, Master, PO 2009
Human Computer Interaction, Master, PO 2014
M.Sc.
Jakobi Timo M.Sc