University of Information Technology

Human Computer Interaction & Information Security

Human Computer Interaction

Course Description

Interaction design is concerned with a broader scope of issues, topics, and methods than human–computer interaction (HCI), with a focus on the diversity of design and evaluation processes involved. This course intends to enable students to

  • describe the principle and characteristics of human-computer interaction, such as direct manipulation, usability affordances, and interaction design heuristics.
  • design the workflow and evaluate user-centered designs, from need finding to prototyping to evaluation.
  • describe the current state of research and development in human-computer interaction, such as augmented reality, wearable devices, and robotics.

Intended Learning Outcomes (ILO)

On completion of this course students should be able to

  • explain the capabilities of both humans and computers from the viewpoint of human information processing.
  • describe typical human–computer interaction (HCI) models and styles, as well as various historic HCI paradigms.
  • apply an interactive design process and universal design principles to designing HCI systems.
  • describe and use HCI design principles, standards and guidelines.
  • analyze and identify user models, user support, socio-organizational issues, and stakeholder requirements of HCI systems.
  • discuss tasks and dialogs of relevant HCI systems based on task analysis and dialog design.
  • analyze and discuss HCI issues in groupware, ubiquitous computing, virtual reality, multimedia, and Word Wide Web-related environments.

Text and References Books

Textbook

  1. Interaction Design : Beyond Human Computer Interaction, 3th Edition by Rogers, Sharp, Preece

Assessment System

Evaluation Marks Percentage
Progress/ Class Participation 5 Marks 5%
Assignment + Discussion + Tutorial 10 Marks 10%
Written Exam 35 Marks 35%

Information Security

Course Description

In this course, students learn basics of information security. It is a study of the principles and practices of computer system security. Information Technology systems need to ensure the confidentiality, integrity, and availability of information. Topics include common attacking techniques such as virus, Trojan, worms and memory exploits; the formalisms of information security such as the access control and information flow theory; the common security policies such as BLP and Biba model; the basic cryptography, RSA, cryptographic hash function, and password system; the system testing with security testing tools. Students will also learn basics of application of cryptography which are one of the key technologies to implement security functions. At the last session, teams of students will make presentation of their study project for a topic related to information security.

This course aims to

  • Explain various information security threat and controls for it.
  • Apply the knowledge and skills obtained to study further concepts in Information Security;
  • Learn the basics of application of cryptography which are one of the key technologies to implement security functions

Intended Learning Outcomes (ILO)

Upon successful completion of this course, the student will have the ability to:

  • describe the importance of information security focusing on confidentiality, integrity, and availability of information
  • define various types of attacks, and how they are spread and executed
  • evaluate common open source and commercial security applications
  • understand what the common threats are faced today, what are the basic principles and techniques when designing a secure system.

Text and References Books

Textbooks

  1. “Information Security” Lecture Manual by Faculty of Information Science, UIT (2014).
  2. “Information Security: Principles and Practice”, 2nd edition by Mark Stamp

 

Assessment System

Evaluation Marks Percentage
Tutorial+ Assignment+ Demonstration 10 Marks 10%
Class Participation 5 Marks 5%
Final Examination 35 Marks 35%