<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Sara Hahn | UCS</title><link>/author/sara-hahn/</link><atom:link href="/author/sara-hahn/index.xml" rel="self" type="application/rss+xml"/><description>Sara Hahn</description><generator>Hugo Blox Builder (https://hugoblox.com)</generator><language>en-us</language><lastBuildDate>Wed, 22 Apr 2026 00:00:00 +0000</lastBuildDate><image><url>/author/sara-hahn/avatar_hu8877798881750216852.jpeg</url><title>Sara Hahn</title><link>/author/sara-hahn/</link></image><item><title>Current Topics in Usable Security Research</title><link>/teaching/advancedseminar-sose-26/</link><pubDate>Wed, 22 Apr 2026 00:00:00 +0000</pubDate><guid>/teaching/advancedseminar-sose-26/</guid><description>&lt;p>&lt;strong>Studierende, die die Veranstaltung belegen möchten, müssen am ersten Termin teilnehmen.&lt;/strong>&lt;/p>
&lt;p>&lt;strong>Students who wish to take the course must attend the first session.&lt;/strong>&lt;/p>
&lt;!-- #### Links
- [Link zur Modulbeschreibung](https://obs.fbi.h-da.de/mhb/modul.php?sem=20251&amp;nr=36.4800)
- Moodle-Kursraum und Termine im OBS hinterlegt -->
&lt;h4 id="topic">Topic&lt;/h4>
&lt;p>In this seminar, students will learn how to conduct and evaluate a systematic literature analysis in the field of &lt;em>Usable Security and Privacy&lt;/em>.&lt;br>
They will investigate how different age groups are supported in dealing with cyber security and privacy in everyday life.
Tools and frameworks for literature analysis, such as PRISMA, will be introduced. Furthermore, students will learn to critically reflect on their findings and derive implications for research.&lt;br>
After completing this seminar, students will be able to conduct systematic literature analyses. Based on this, they will be able to situate their findings within related and current research, identify gaps and challenges, and propose research implications and opportunities for improvement.&lt;/p>
&lt;h4 id="formalia">Formalia&lt;/h4>
&lt;ul>
&lt;li>The language of the seminar is &lt;em>English&lt;/em>.&lt;/li>
&lt;li>Further formalities will be announced in the first session (15.04.2026).&lt;/li>
&lt;li>Assessment components:
&lt;ul>
&lt;li>Graded scientific paper (10–20 pages)&lt;/li>
&lt;li>Graded presentation (45–60 minutes)&lt;/li>
&lt;li>The final grade consists of 70% for the written paper and 30% for the presentation.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;!-- - Erster Termin: 28.04.2022 08:30-10:00 D14/04.03
- Themen werden am ersten Termin vergeben
- Themen werden in 2er Gruppen bearbeitet
- Gesamtnote: schriftlichen Ausarbeitung (70%) und Präsentation inkl. Diskussion (30%)
- Umfang der schriftlichen Ausarbeitung: 18-20 Seiten im [LaTeX LNI Style](https://www.ctan.org/pkg/lni) ohne Literaturverzeichnis
- Weitere Details werden am ersten Termin genannt -->
&lt;h4 id="initial-literature-and-links">Initial Literature and Links&lt;/h4>
&lt;ul>
&lt;li>Garfinkel, Simson, and Heather Richter Lipford. &amp;ldquo;Usable security: History, themes, and challenges.&amp;rdquo; Synthesis Lectures on Information Security, Privacy, and Trust 5.2 (2014).&lt;/li>
&lt;li>&lt;a href="https://www.usenix.org/conferences/byname/884" target="_blank" rel="noopener">Symposium On Usable Privacy and Security (ab 2015)&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://os.ucs.h-da.de/papers" target="_blank" rel="noopener">Conference Scraper - UCS&lt;/a>&lt;/li>
&lt;/ul>
&lt;h4 id="teacher">Teacher&lt;/h4>
&lt;p>&lt;a href="/author/sara-hahn">Sara Hahn&lt;/a>&lt;/p>
&lt;!-- [Andreas Heinemann](/author/andreas-heinemann/) --></description></item><item><title>PIONEER project presents current investigations and publications</title><link>/post/2025-08-07-iv2025-poster/</link><pubDate>Mon, 25 Aug 2025 00:00:00 +0000</pubDate><guid>/post/2025-08-07-iv2025-poster/</guid><description>&lt;p>The ATHENE research project PIONEER was featured at the 29th International Conference Information Visualisation held on August 07, 2025 in Darmstadt.
The conference brought together leading experts from academia and research institutions to discuss the latest developments in information visualisation, machine learning, and data science.&lt;/p>
&lt;p>During the event, Sara Hahn presented the latest research investigations and publications on PIONEER’s innovative Digital Privacy Companion.
In her talk, Sara Hahn provided a comprehensive overview of the project’s theoretical foundations and research methodology, while also showcasing current investigations, findings, and recent publications.&lt;/p>
&lt;p>The PIONEER project is part of ATHENE’s mission to advance cybersecurity and privacy research with practical solutions that can be transferred into real-world applications. &lt;/p>
&lt;p>
&lt;figure id="figure-sara-hahn-presenting-the-poster-on-day-2-of-the-iv2025-conference-image-169-iv2025">
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="Impressions 1" srcset="
/post/2025-08-07-iv2025-poster/iv2025-vortrag_hu5094054220572214178.webp 400w,
/post/2025-08-07-iv2025-poster/iv2025-vortrag_hu14161170330207345930.webp 760w,
/post/2025-08-07-iv2025-poster/iv2025-vortrag_hu16404996694804680953.webp 1200w"
src="/post/2025-08-07-iv2025-poster/iv2025-vortrag_hu5094054220572214178.webp"
width="570"
height="760"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;figcaption>
Sara Hahn presenting the poster on Day 2 of the IV2025 Conference. Image © IV2025
&lt;/figcaption>&lt;/figure>
&lt;/p></description></item><item><title>PIONEER project presents current results</title><link>/post/2024-11-19-conference-ffm/</link><pubDate>Thu, 21 Nov 2024 00:00:00 +0000</pubDate><guid>/post/2024-11-19-conference-ffm/</guid><description>&lt;p>UCS recently participated in the ATHENE-Conference on Cognitive Security, held on November 19, 2024, at the historic Jügelhaus in Frankfurt am Main. The event gathered experts from academia, media, and politics to address the pressing challenges posed by cognitive attacks in the digital age. In addition to interesting talks and an insightful panel discussion, several projects were presented in the demo sessions.&lt;/p>
&lt;p>Sara Hahn had the opportunity to present the ATHENE project PIONEER’s mobile prototype during the demo sessions with her project colleagues from the TU Darmstadt. The conference guests could explore the prototype’s features, such as lessons and quizzes about privacy, or compare applications regarding their privacy friendliness.&lt;/p>
&lt;p>Within our project PIONEER, we strive to empower users in their digital sovereignty by providing them with the necessary knowledge and motivating them to acquire and apply competencies in their everyday digital lives.&lt;/p>
&lt;p>
&lt;figure id="figure-the-pioneer-team-image-169-catharina-frank">
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="Impressions 1" srcset="
/post/2024-11-19-conference-ffm/ATHENE-Kognitive-Sicherheit-1_hu8642171385057479289.webp 400w,
/post/2024-11-19-conference-ffm/ATHENE-Kognitive-Sicherheit-1_hu1111056830116826190.webp 760w,
/post/2024-11-19-conference-ffm/ATHENE-Kognitive-Sicherheit-1_hu7028380283064851052.webp 1200w"
src="/post/2024-11-19-conference-ffm/ATHENE-Kognitive-Sicherheit-1_hu8642171385057479289.webp"
width="760"
height="507"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;figcaption>
The PIONEER Team. Image © Catharina Frank
&lt;/figcaption>&lt;/figure>
&lt;/p>
&lt;p>
&lt;figure id="figure-conference-impressions-image-169-catharina-frank">
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="Impressions 2" srcset="
/post/2024-11-19-conference-ffm/ATHENE-Kognitive-Sicherheit-2_hu9225478459891510529.webp 400w,
/post/2024-11-19-conference-ffm/ATHENE-Kognitive-Sicherheit-2_hu8227128744662219430.webp 760w,
/post/2024-11-19-conference-ffm/ATHENE-Kognitive-Sicherheit-2_hu10417369759856008191.webp 1200w"
src="/post/2024-11-19-conference-ffm/ATHENE-Kognitive-Sicherheit-2_hu9225478459891510529.webp"
width="760"
height="507"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;figcaption>
Conference Impressions. Image © Catharina Frank
&lt;/figcaption>&lt;/figure>
&lt;/p></description></item><item><title>How to Respect Bystanders' Privacy in Smart Homes - A Co-Creation Study</title><link>/publication/2024-nordchi-hahn/</link><pubDate>Wed, 16 Oct 2024 05:01:40 +0000</pubDate><guid>/publication/2024-nordchi-hahn/</guid><description>&lt;h2 id="abstract">Abstract&lt;/h2>
&lt;p>As technology advances, homes become more digitalized and evolve into smart homes. Bystanders, e.g. guests in smart homes, are often unaware of the smart home devices and the associated privacy risks that make them especially vulnerable. However, so far there is limited research on how the guests can be made aware of smart home devices in the household and how their resulting privacy preferences can be addressed while respecting the smart home owners’ preferences as well. To close this gap, we conducted three co-creation workshops with ten participants (N=10) developing various design solutions. Through a thematic analysis of our data, we identified design solutions for smart home devices and beyond, like higher-level applications for regulating privacy and inherent responsibility. We recommend a multi-modal approach focusing not only on the design of the devices but also on the higher-level management of privacy in smart homes.&lt;/p></description></item></channel></rss>