Differences From Artifact [ac3a505a11]:

To Artifact [28ff6e6f80]:


1
2

3



4


5

6
7
8
9
10
11
12
13
14


1
2
3

4
5
6
7
8
9

10
11
12







13
14


+
-
+
+
+

+
+
-
+


-
-
-
-
-
-
-
+
+
# Week 4

## Lecture
**No lecture on Monday, but we do have a special lecture on Thursday (see [week 5](5.md)).**

Readings
: - TK

In this lecture, we will be joined by **Danny Spitzberg**, a user researcher.

## Tutorial
**No tutorials this week.**

Homework
: - Come up with a fictional research scenario and complete the [EFF risk assessment](https://ssd.eff.org/en/module/your-security-plan) for that hypothetical scenario. Think about what skills or tools you would need to mitigate the risks you identified.
- Browse some of the following resources and write down a few ideas for what you would like to work on for your second assignment:
    - <https://defendourmovements.org/resources/>
    - <https://myshadow.org/>
    - <https://securityinabox.org/en/>

During tutorials, you will discuss and plan the [second assignment](../assignments/2.md). This will require forming groups with two or three other students in your tutorial group and coming up with a contribution to the Hacking Ethnography collection.
: - Learn about the Crisis Text Line scandal by reading McNeil (2022) and at least one additional source of your own choice.
- Take some notes to prepare for a discussion in next week's tutorials.