UMD Cybersecurity Specialization/Usable Security 6
- Usable Privacy: privacy settings, personal data sharing, data inference
- Usable Authentication: authentication mechanisms, biometrics, two-factor authentication
- Strategies for Secure Interaction Design: authority, guidelines for interface design
- Evaluation: usability studies, A/B testing, quantitative and qualitative evaluation, cybersecurity case study
- Design: design methodology, prototyping, cybersecurity case study
- Fundamentals of Human-Computer Interaction: users, usability, tasks, and cognitive models