Verena Zimmermann: Catalogue data in Autumn Semester 2023 |
| Name | Prof. Dr. Verena Zimmermann |
| Name variants | Verena Schochlow |
| Field | Security, Privacy and Society |
| Address | Sicherheit, Privatsphäre u. Gesell ETH Zürich, STB G 19 Stampfenbachstrasse 69 8092 Zürich SWITZERLAND |
| Telephone | +41 44 632 34 96 |
| verena.zimmermann@gess.ethz.ch | |
| URL | https://spg.ethz.ch/ |
| Department | Humanities, Social and Political Sciences |
| Relationship | Assistant Professor (Tenure Track) |
| Number | Title | ECTS | Hours | Lecturers | ||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 851-0252-04L | Behavioral Studies Colloquium | 1 credit | 2K | E. Cross, U. Brandes, D. Helbing, C. Hölscher, M. Kapur, C. Stadtfeld, E. Stern, V. Zimmermann | ||||||||||||||||||||||||||||||||||||||||||||||||||
| Abstract | This colloquium offers an opportunity to discuss recent and ongoing research and scientific ideas in the behavioral sciences, both at the micro- and macro-levels of cognitive, behavioral and social science. The colloquium features invited presentations from internal and external researchers as well as presentations of doctoral students close to submitting their dissertation research plan. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
| Learning objective | Participants are informed about recent and ongoing research in different branches of the behavioral sciences. Presenting doctoral students obtain feedback on their dissertation research plan. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
| Content | This colloquium offers an opportunity to discuss recent and ongoing research and scientific ideas in the behavioral sciences, both at the micro- and macro-levels of cognitive, behavioral and social science. It covers a broad range of areas, including theoretical as well as empirical research in social psychology, research on higher education, sociology, modeling and simulation in sociology, decision theory and behavioral game theory, economics, research on learning and instruction, cognitive psychology and cognitive science. The colloquium features invited presentations from internal and external researchers as well as presentations of doctoral students close to submitting their dissertation research plan. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
| Prerequisites / Notice | https://sbs.ethz.ch/education.html | |||||||||||||||||||||||||||||||||||||||||||||||||||||
| 851-0391-00L | Focus on the Human: Human-Centered Security and Privacy Lab The course is particularly suitable for all students who have already completed the course “Human-centered IT Security and Privacy” as some of the concepts introduced will practically be applied in this course. However, the relevant literature and necessary material will be provided to all students and basic concepts will be briefly summarized so that all interested students can participate. | 3 credits | 2S | V. Zimmermann, L. Schöni | ||||||||||||||||||||||||||||||||||||||||||||||||||
| Abstract | After an introduction on usable security as the intersection of computer science and psychology, students will form teams and work on exemplary security- or privacy-related research questions. The teams will develop and evaluate a concept for a human-centered solution. Through input sessions and milestone presentations the human perspective will be incorporated and reflected upon. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
| Learning objective | The course makes students experience an exemplary human-centered design process. They will learn about and practically apply human-centered design and evaluation methods that will allow them to view their solution from the human perspective, e.g., the user, developer or website owner perspective. By taking part in the evaluation of other teams, they will also take the user perspective themselves. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
| Content | At the beginning of the course, the students will receive an introduction to usable IT security and privacy and relevant concepts. Afterwards, a selection of current research questions from that area will be presented. The students form teams and select one of the proposed research questions. This question will accompany the students throughout the semester. They will design and evaluate a concept for a human-centered solution to that question. To be able to do so, they will receive input on human-centered design and evaluation tools. Their progress and the inclusion of the human perspective will be subject to feedback in milestone presentations. The students’ human-centered solution can take the form of a concept (e.g., a concept for a product or app), interface (e.g., a visual or tangible interface), or prototype (e.g., sketches, a click-dummy or a built prototype). The solution will then be subject to evaluations. The solutions will be user-tested by members of other teams that thereby take the perspective of a user themselves. In addition, the solutions will be analyzed from different stakeholders’ perspectives, such as developers or website owners. Finally, the students will reflect on potential changes that results from the evaluations and their consequences. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
| Literature | Literature Recommendations: Adams, A., & Sasse, M. A. (1999). Users are not the enemy. Communications of the ACM, 42(12), 40-46. Cranor, L. F., & Garfinkel, S. (2005). Security and usability: designing secure systems that people can use. " O'Reilly Media, Inc.". Diefenbach, S., & Hassenzahl, M. (2017). Psychologie in der nutzerzentrierten Produktgestaltung: Mensch-Technik-Interaktion-Erlebnis. Springer-Verlag. Diefenbach, S., & Hassenzahl, M. (2010). Handbuch zur Fun-ni Toolbox–User Experience Evaluation auf drei Ebenen. Dix, A., & Finlay, J., Abowd, G., Beale, R. (2004). Human-computer interaction. Pearson - PRENTICE HALL. Garfinkel, S., & Lipford, H. R. (2014). Usable security: History, themes, and challenges. Synthesis Lectures on Information Security, Privacy, and Trust, 5(2), 1-124. Nielsen, J. (1999). Designing web usability: The practice of simplicity. New Riders Publishing. Norman, D. (2013). The design of everyday things: Revised and expanded edition. Basic Books (AZ). Reuter, C. (2018). Sicherheitskritische Mensch-Computer-Interaktion. Wiesbaden: Springer Fachmedien Wiesbaden. Sarodnick, F., & Brau, H. (2006). Methoden der Usability Evaluation. Verlag Hans Huber. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
| Prerequisites / Notice | This course is especially recommended after having participated in the related lecture/exercise "851-0390-00 G Human-Centered IT Security and Privacy". However, previous participantion in the lecture is not a requirement. Additional material will be made available so that also students with no prior knowledge in that area can participate. | |||||||||||||||||||||||||||||||||||||||||||||||||||||
| Competencies |
| |||||||||||||||||||||||||||||||||||||||||||||||||||||

