Module 6: The Human Factor

A 6-Unit Module that Started on January 2023 and was Covered in 6 Weeks by Samuel Danso


Tasks and Assignments Done throughout this Module

Below is a breakdown of the activities done weekly during the 6-Unit Module.

  1. Week 1: Unit 1 - Human Factors and Cyber Security
  2. After going through a Lecture cast, books and a having a lesson with the Lecturer, I gained knowledge on human behaviour and its implications in designing computing systems within the context of cyber security.

    We also got to discuss human capabilities and limitations and their impact on usable security.

    Additionally, we discussed the concept of insider threat and accidental insider and their effect on security

    Below is my lay summary review on the article by Zhang et al. (2017)

    Download PDF

  3. Week 2: Unit 2 - Human Behaviour and Security Implications
  4. This unit focused on analysis of human factors, human behaviour and human capabilities and limitations.

    We got to apply the knowledge gained in the first unit to identify methods of understanding human behaviour design solutions, based on factors relating to security and its implications.

  5. Week 3: Unit 3 - Mental Models and Privacy by Design and by Default Principles for Usable Security Design
  6. We had a Lecture cast and book reading that introduced mental models, privacy by design principles and contextual design approaches to designing usable security solutions.

    The unit further discussed how users' and designers' mental models can be combined to achieve optimal design solution though the lens of Human Computer Interaction.

    We had an Assessment Individual Essay that focused on fully outlining my viewpoint on the human factors and socio-technical problems in Queens Medical Centre is a community clinic scenario. Below is the essay that I handed out.

    Download PDF

  7. Week 4: Unit 4 - Usable Security Design by Default
  8. With the use of books, practical examples and reading activities, we explored the various techniques to consider when planning a usable design solution by default.

    We learned the pros and cons of logging and the impact of log4j.

    We also discussed the strengths and weakness of the techniques and their application contexts and also applied the privacy by design principles and contextual design approach to a case study.

    The lecturer tasked each of us with reviewing and responding to two Individual Essays from my peers. Here is my feedback.

    Download PDF

  9. Week 5: Unit 5 - Achieving Optimal Cyber Security: The Ethics and Organisational Issues
  10. With the use of a Lecture cast, books and a lecture, we looked at the cultural, organisational issues and their impact on security, as well as the frameworks to develop a positive, organisational security culture.

    We also discussed the legal and ethical requirements and implication when developing usable security and reflected on the current and future research in the various areas of usable security, and human factors in cyber security.

  11. Week 6: Unit 6 - Behaviour Analysis for Positive Security and Risk Communication
  12. It focused on employing mental models as an approach to developing a Cyber Security risk communication strategy.

    We got to apply the knowledge you have gained in Unit 5 to identify appropriate mental models and employ these models to develop a robust communication plan, as a method to address the human factors issue in an organisation.

    We were each tasked with presenting solutions to the issues identified in the first assessment (Unit 3), including social and ethical considerations. Below is my presentation in pdf and its transcript respectively.

    Individual Presentation in pdf

    Download PDF

    Transcript of the Individual Presentation

    Download PDF


    Contact

    Please Do Not Hesitate to Contact Me at mutegibeatrice93@gmail.com for more Information