Recommendations for a Graduate Seminar in Usable Security

نویسنده

  • Kent Seamons
چکیده

In the spring of 2006, I taught a graduate student research seminar on usable security at Brigham Young University (BYU). It was likely one of the first graduate seminars devoted exclusively to the nascent field of usable security. The course consisted primarily of readings from Security and Usability, a collection of papers in the field that had recently been edited by Cranor and Garfinkel [2]. Seven graduate students participated in the course. Students took turns presenting the papers, and all students brought a written critique to class that analyzed the papers scheduled for discussion. As a final project, each student designed a usability study related to a system or topic that interested them. This seminar was instrumental in launching usable security as an emphasis in my research lab at BYU. Some recent lab projects included user studies in the areas of secure email [7] and secure web authentication [8]. My annual graduate security seminars since that time have continued to include several papers in the area of usable security. Next year, I plan to teach another graduate seminar devoted to usable security. This position paper outlines the student learning objectives for the seminar based on my nearly 10 years of experience in usable security research and education. It contains several recommendations for the usable security community to create resources that will assist educators and students in this field.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

THE SCS GRADUATE ADMINISTRATOR IN ORDER TO BE ALLOWED TO SCHEDULE A PRESENTATION IN THE GRADUATE SEMINAR SERIES Abstract Approval For OCICS Graduate Seminar Series

Approval For OCICS Graduate Seminar Series Student #: ______________ Date: ______________ Student’s Name: _______________________ Signature: ______________________ Student’s Email: _______________________ Seminar Title: ___________________________________________________________ Preferred Presentation Date: __________ (This will be confirmed with the student by email) Abstract approved: YES NO ...

متن کامل

Rethinking Security Requirements in RE Research Technical Report

As information security became an increasing concern for software developers and users, requirements engineering (RE) researchers brought new insight to security requirements. Security requirements aim to address security at the early stages of system design while accommodating the complex needs of different stakeholders. Meanwhile, other research communities, such as usable privacy and securit...

متن کامل

Network Architectures and Services Net 2010-02-01 Proceedings of the Seminar Innovative Internet Technologies and Mobile Communication (iitm) Proceedings of the Seminar Innovative Internet Technologies and Mobile Communication (iitm) Cataloging-in-publication Data

A Wireless Sensor Network (WSN) is a tool with many applications. Because of its characteristic structure and hardware composition, it is much more difficult to ensure authentication, integrity and confidentiality in WSNs. Several algorithms have been proposed to fulfill these requirements. However, securing each OSI layer individually leads to inefficiencies in the operation of the network and...

متن کامل

Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures

This report documents the program and the outcomes of Dagstuhl Seminar 14292 “Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures”. The main objective of the seminar was to discuss new approaches and ideas for securing industrial control systems. It is the sequel of several previous Dagstuhl seminars: (1) the series “Network Attack Detection an...

متن کامل

Towards the Usability Evaluation of Security APIs

Application Programming Interfaces (APIs) are a vital link between software components as well as between software and developers. Security APIs deliver crucial functionalities for programmers who see themselves in the increasing need for integrating security services into their software products. The ignorant or incorrect use of Security APIs leads to critical security flaws, as has been revea...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015