Security, Usability and Society

Course type:Seminar
Course:2 SWS / 3 CP (ECTS)
Lecturer:Prof. Dr. Melanie Volkamer
Number of the lecture:20-00-0987
Organisation:Dr.-Ing. Jurlind Budurushi, Peter Mayer
Supervisors:Melanie Volkamer, Stephan Neumann, Oksana Kulyk, Peter Mayer, Paul Gerber and Jurlind Budurushi
First Meeting:21.10.2016, 10:00: Kick-Off meeting in S4|14 - 5.3.01 (Mornewegstraße 32) with presentation of available topics
Requirements:Interest in interdisciplinary topics and research work, basic knowledge in security.
Registration:Via e-mail to the organiser, (NOTE: The registration in TUCaN is also mandatory.)
Formatting:Use LNCS MS Word or LaTeX template, 8-12 pages, excluding references and appendices.
Submission date:24.03.2016
Presentations:17.03.2016, 10:00 in S4|14 - 5.3.17 (Mornewegstraße 32)

General Information

All presentations will take place on one day (two days if needed). This day will be organized similar to a talk or visit at a scientific conference. This format ensures that the preparation times are identical for all participants. We will meet all together only twice: to award topics/preliminary discussion and at the talks. Questions that arise during the work of the individual topics will be discussed with the respective supervisor in individual meetings. Further information is available at the preliminary discussion.

The slides from the "Presentation Skills" workshop can be found here.

For the presentations the following template has to be used: PPT. Please note the comments within the template and consider them for your own presentation.

Teaching goals

The participants of this seminar dedicate themselves to the question how to make information systems not only theoretically secure, but how to develop them in a manner such that they are practical, effective and usable for the general public. Therefore, several aspects will be covered within this seminar: usability and comprehensibility, user experience, motivation, and awareness as well as user education and legal requirements in Human-Computer Interaction for security critical applications. After completion of this seminar, the participants will be able to
- systematically read up on the literature on a specific topic under supervision
- structuring scientific work
- write scientific texts
- present scientific topics and the respective findings Possible topics include: electronic voting, e-commerce, e-mail, e-banking, social engineering, and authentication.

Topics, Elaborations and Talks

The topics are available undefinedhere. For getting familiar with the topics that usually supervised in our group, visit the seminar pages of the previous semesters.

You are welcome to suggest your own topic in the areas covered by our group. Note that suggested topics require a SECUSO member as supervisor. We advice you to check each members webpage for suitable supervisors.

Integration into study plan and examination regulations

The seminar is aimed at bachelor's candidates, master's candidates, diploma students, and potential teachers of computer science, WI-degree programs, Electrical Engineering and Information Technology from Semester 5, as well as bachelor's and master's candidates in the field of trusted systems. The seminar is part of the master's program in IT-Security. We further welcome students from the area of interdisciplinary NAG (Wissenschafts- und Technikforschung - Normen, Ambivalenzen, Gestaltungsoptionen) studies.

A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Suche Search | Kontakt Contact | Website Analysis: More Information
zum Seitenanfangzum Seitenanfang