Methods

Methods#

Guides for planning, conducting, analyzing, and reporting research methods used in the group.

Interviews

Interviews#

Resources and guides for conducting research interviews in usable security and human-centered security.

Start with Pre-study, continue with Study after IRB approval, and use Reporting when writing the paper.

  • IF it is your first time conducting interviews, consider reading through the whole page.
  • IF you are short on time or revisiting interviews, check out the Cheat Sheet section for a high-level overview.
  • IF you are looking for a specific aspect, check out the Table of Contents on the right side.
  • ELSE check out the Examples section for inspiration from real-world interview papers.

Interview Pages#

  • Interviews: Pre-study covers preparation before data collection, including data protection, interview guides, piloting, recruiting, and consent collection.
  • Interviews: Study covers conducting interviews, data collection, transcription, and data analysis.
  • Interviews: Reporting covers writing interview methods and results, quotes, demographics, reporting numbers, and saturation.

Examples#

See also the group drive for past IRB example applications and consent forms: https://drive.google.com/drive/folders/11rJkniObDSS1tXbCuHUC3euDCRDBaJPn?usp=drive_link

Experiments
Experiment design and resources
Surveys

How to Survey#

One key technique for understanding and improving how human decision making affects information security and privacy is the gathering of self-reported data from users. This data is typically gathered via survey and interview studies, and serves to inform the broader security and privacy community about user needs, behaviors, and beliefs. The quality of this data, and the validity of subsequent research results, depends on the choices researchers make when designing their experiments.

Qualitative Coding
Resources for qualitative coding