Usable Security and Privacy
Problem Set 4
Due in class, on paper at 3:00pm on Monday, May 1st.
Problem 1 (25 points)
A handful of papers you have read so far in this class have used statistics to support their arguments. In particular, for this problem, you should consider the following five papers: Woodruff et al. (April 3rd); Ur et al. (April 5th); Akhawe and Felt (April 12th); Johnson et al. (April 17th); and Felt et al. (April 24th).
Skim back through these five papers and note what different statistical tests they use. Then, create and submit a table that shows how these five studies used different statistical tests. Use the following format for your table, where each row represents an analysis you found in one of the papers:
Group the rows of your table based on the type of analysis the statistics are being used to support. It may be easiest to split your table into multiple smaller tables. For example, if one paper uses statistical test Foo to compare Likert-scale survey questions and another paper uses statistical test Foo or statistical test Bar to compare survey questions where the structure of the data or comparison seems similar, group those together.
Note that even if a particular paper uses a particular test multiple times, you only need to report it once in your table. For example, if Ur et al. use the XYZ test 15 times and the ABC test 32 times, you only need to report once in your table that Ur et al. use the XYZ test (pick representative answers for each column of your table) and once that Ur et al. use the ABC test.
Problem 2 (25 points)
We have provided you the following dataset about deaths on the Titanic. The first link is to the raw data. The second explains the dataset; its appendix explains the column values.
Using whatever tool you prefer, conduct two different (appropriate) statistical tests to analyze this data.
You should turn in a single paragraph containing all of the following information:
If you don't have prior experience with any statistical software, we highly recommend you go through Blase's R tutorial, which includes lots of sample code.
Problem 3 (25 points)
Political activists frequently fear being surveilled by a wide range of adversaries (ranging from governments to opposing factions), yet often lack the technical knowledge to keep themselves secure and private.
To help bridge this gap, create a 1-2 page overview for (non-technical) activists outlining what you believe to be the essential steps they can take to protect their privacy and security, including everything you think they need to know. We'd like to actually distribute some of these (with your permission), so style counts! Think about what you could imagine receiving as a handout (one-sided or two-sided). Think also about the best designed infographics you have seen and use those as aesthetic inspiration. Please turn in the following:
Here are some starting resources you might consider when deciding what advice to include or leave out:
Problem 4 (25 points)
Write a first draft of the methodology section for your group's research project. For the purpose of the homework assignmet, each team member should do this individually. Afterwards, your team will have a whole set of methodology drafts, which will allow you to combine the strongest aspects of each.
(CMSC 33210 only!) Problem 5 (24 points)
Write 3-7 sentence summaries and short "highlights" for both the Englehardt and Narayanan reading assigned for April 24th and the Wang et al. reading assigned for April 26th.