Assignments
- [Sep 11] Why Johnny Can't EncryptDue Sep 11, 2024 at 8am5 Points Possible
- [Sep 13] Eight Lightweight Usable Security Principles for DevelopersDue Sep 13, 2024 at 8am5 Points Possible
- [Sep 16] Obstacles to Adoption of Secure Communication ToolsDue Sep 16, 2024 at 8am5 Points Possible
- Paper Presentation Request Mega ThreadDue Sep 16, 2024 at 11:59pmNo Points Possible
- [Sep 18] Why Aren't We Using Passkeys?Due Sep 18, 2024 at 8am5 Points Possible
- [Sep 20] Track You: A Deep Dive into Safety Alerts for Apple AirTagsDue Sep 23, 2024 at 8am5 Points Possible
- [Sep 23] What was that site doing with my Facebook password?Due Sep 23, 2024 at 8am5 Points Possible
- [Sep 25] Crying Wolf: SSL WarningDue Sep 25, 2024 at 8am5 Points Possible
- [Sep 27] A comprehensive quality evaluation of security and privacy advice on the webDue Sep 27, 2024 at 8am5 Points Possible
- [Sep 30] On the Usability of Deploying HTTPSDue Sep 30, 2024 at 8am5 Points Possible
- [Oct 2] You are not your developerDue Oct 2, 2024 at 8am5 Points Possible
- [Oct 7] Inclusive Security Intervention to Center Marginalized & Vulnerable Populations in Security & Privacy DesignDue Oct 7, 2024 at 8am5 Points Possible
- [Oct 9] Clinical Computer Security for Victims of IPVDue Oct 9, 2024 at 8am5 Points Possible
- [Oct 11] Digital Security — A Question of Perspective A Large-Scale Telephone SurveyDue Oct 11, 2024 at 8am5 Points Possible
- [Oct 14] Sok: A framework for unifying at-risk user researchDue Oct 14, 2024 at 8am5 Points Possible
- [Oct 16] Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal AbuseDue Oct 16, 2024 at 8am5 Points Possible
- [Oct 18] Threat Modeling Intimate Partner ViolenceDue Oct 18, 2024 at 8am5 Points Possible
- [Oct 21] An analysis of the integration of biometric voter verificationDue Oct 21, 2024 at 8am5 Points Possible
- [Oct 23] Examining security and privacy research in developing regionsDue Oct 23, 2024 at 8am5 Points Possible
- [Oct 25] Threat Experiences and Security Practices of Pakistani Content CreatorsDue Oct 25, 2024 at 8am5 Points Possible
- [Oct 28] Defensive Technology Use by Political Activists During the Sudanese RevolutionDue Oct 28, 2024 at 8am5 Points Possible
- Mid-project presentation and Peer reviewsDue Nov 6, 2024 at 11:59pm15 Points Possible
- [Nov 18] Toward a Decolonial CybersecurityDue Nov 18, 2024 at 8am5 Points Possible
- [Nov 20] Social cybersecurity: An emerging scienceDue Nov 20, 2024 at 8am5 Points Possible
- [Nov 22] How well do my results generalizeDue Nov 22, 2024 at 8am5 Points Possible
- [Nov 25] The Antrim County 2020 ElectionDue Nov 25, 2024 at 8am5 Points Possible
- Project presentationDue Dec 9, 2024 at 11:59pm30 Points Possible
- Final Project ReportClosedDue Dec 17, 2024 at 11:59pm35 Points Possible
- Paper presentation gradeDue Dec 9, 2024 at 11:59pm10 Points Possible
- Mid Project Presentation Feedback threadClosedDue Nov 8, 2024 at 11:59pm5 Points Possible
- Project proposalClosedDue Oct 6, 2024 at 11:59pm10 Points Possible
- Project Group creationClosedDue Sep 23, 2024 at 11:59pm5 Points Possible
- [Sep 9] Ethical Frameworks and Computer Security Trolley ProblemsClosedDue Sep 9, 2024 at 8:30am5 Points Possible