News
Currently, no news are available
Important
We limit the number of students who can participate in this course to 30. We will open the registration on CMS from 7 April 2026, 10 am until 9 April 2026, 10 am.
If the number of registered students exceeds 30 when registration closes, we will randomly select 30 students from all registered students to participate in the course.
Therefore, please sign up only if you really want to stick with this lecture and fulfill all the prerequisites. If you do not meet these prerequisites, you will likely not be able to pass the assignments and the exam.
Prerequisites
Foundations of Cybersecurity 1 and 2, or the core lecture Security. Additionally, deep knowledge in statistics (Mathematics for Computer Scientists 2 and/or Statistics Lab)
These are the topics needed to follow this course, and we won't cover them in this lecture.
Overview
In this lecture, you will learn about human-centric aspects of IT security. In addition to research and design methods, you will learn about hot topics in usable security, such as authentication, confidentiality, and privacy. In particular, you will learn to
- design user studies to study how humans interact with security & privacy technology with respect to threat models,
- collect, understand, and evaluate qualitative & quantitative data,
- interpret results and draw conclusions based on your data,
- design new security and privacy technology that is better tied to the users' needs and values.
Please make sure to allocate enough time to prepare for the assignments for this course. Programming skills and profound knowledge of statistics and data analysis are required. If you have not yet completed any security courses, BUT have a strong background in human-computer interaction, psychology, or design, you are still welcome to attend this interdisciplinary lecture. In that case, please get in touch with us to discuss whether this is the right course for you.
Registration
This lecture is limited to 30 students. You can register from 7 April 2026, 10 am until 9 April 2026, 10 am, and we will randomly pick 30 students from those who registered.
Registration closes: 9 April 2026, 10 am (CMS).
Contact: usablesecurityAL@cispa.de
Please contact us only via this email address and refrain from contacting team members individually.
When & Where?
The lecture will take place on Mondays from 10:00 to 12:00, starting on 20 April 2026. See the calendar for concrete dates. The last lecture will be on 13 July 2026. The final exam will be on 20 July 2026, and the re-exam will be on 17 August 2026.
There will be two office hours in total, one before each in-person assignment.
Locations
Lectures will be in the CISPA Lecture Hall (Room 0.05).
Grading
The written exam will determine your grade. You will need more than 60% of the available points to pass this course.
To be admitted to the exam, you will have to pass both in-person assignments by scoring more than 60% of the available points in each assignment.
Assignments
There will be 2 in-person assignments during the lecture period. Passing them is a requirement to be admitted to the exam, meaning you cannot pass the lecture without them.
The assignments will cover the content from the lectures and materials we provide beforehand. We already set the dates, and we expect every student to be there if they want to pass the lecture.
If the dates do not work for you, do not sign up for this course!
| Assignment | Date | Location |
|---|---|---|
| Assignment 1 (Qualitative) | 15 June 2026 | CISPA Lecture Hall (Room 0.05) |
| Assignment 2 (Quantitative) | 06 July 2026 | CISPA Lecture Hall (Room 0.05) |
You must score more than 60% of the available points in each assignment to be admitted for the exam.
Office Hours
There will be two office hours in total, each scheduled about a week before each in-person assignment. We will announce the exact times and dates beforehand.
Exam
The exam will consist of knowledge questions and scenarios that we expect you to solve. Only those who fail the written exam will be able to take a re-take exam.
Exam: 20 July 2026, 10 am, CISPA Lecture Hall, Room 0.05
(Mandatory registration in HISPOS LSF before)
Lecture Overview & Topics
Please note that this is a tentative timetable. Changes will be announced as news posts. Refer to the timetable on CMS for more details.
| Date | Topic |
| 20.04.26 | Introduction & Qualitative research methods |
| 27.04.26 | Lecture |
| 04.05.26 | Lecture |
| 11.05.26 | Lecture |
| 18.05.26 | Lecture |
| 08.06.26 | Lecture |
| 15.06.26 | Assignment (Qualitative) |
| 22.06.26 | Lecture |
|
29.06.26 |
Lecture |
| 06.07.26 | Assignment (Quantitative) |
| 13.07.26 | Lecture |
| 20.07.26 | Exam |
| 17.08.26 | Re-Exam |
Is this the right course for me?
This course is intended for all computer scientists who would like to take an interdisciplinary perspective on the origins of security vulnerabilities. It will also be of interest to anyone interested in societal discourse about the security and privacy of the systems we interact with. In this course, you will have the chance to conduct interdisciplinary research, including designing user studies and collecting and analyzing data. You will also have to write code and use statistical testing. Please make sure you meet the requirements stated above to determine whether your knowledge is sufficient for this course.
Mental Health
Being a student can be challenging and very overwhelming at times. If you need support during times of struggle, reach out to friends, family, or faculty you trust. The student union at UdS also offers a counselling service that you may contact. You do not have to go through this alone! If, for whatever reason (e.g., a personal emergency), you cannot attend the lecture, tutorial, or deliver your work in time, please let us know, and we will make appropriate arrangements.
