| Jan 7 | Objectives of the course, Logistics of the course, aligning the expectations from both sides, introduction to Human Computer Interaction | Lecture 1 Slides |
| Jan 10 | Design Process overview | Lecture 2 Slides |
| Jan 17 | HCI approach to UI | Lecture 3 Slides |
| Jan 21 | User Centred design, myths of design, Waterfall and iterative design | Lecture 4 Slides |
| Jan 24 | Cyber-Physical Building Systems | Guest Lecture 1 |
| Jan 24 | Overview - Mixorg | Guest Lecture 2 |
| Jan 28 | Contextual Inquiry & Task Analysis | Lecture 6 Slides |
| Feb 4 | Summmarizing behavior trajectories in Online Health Communities | Guest Lecture 3 |
| Feb 8 | Prototyping | Lecture 7 Slides |
| Feb 11 | Fudamentals of user studies | Guest Lecture 4 |
| Feb 14 | Designing Usable and Secure CAPTCHA for voice and web media | Guest Lecture 5 |
| Feb 14 | Voice based information system for developing nation | Guest Lecture 6 |
| Feb 18 | Design Patterns | Lecture 9 Slides | Feb 18 | Social Networks for Agricultural Development | Guest Lecture 7 |
| March 4 | Design Patterns | Lecture 11 Slides |
| March 7 | Fitt Law | Lecture 12 Slides |
| March 11 | Interaction design for development | Guest Lecture 8 |
| March 14 | Account Hijacking | Guest Lecture 9 |
| March 25 | Discount Usability | Lecture 13 Slides |
| March 28 | Usable Security | Lecture 14 Slides |
| April 1 | PhishGuru: A case study | Lecture 15 Slides |
| April 8 | Security Issues in Bankless Banking | Guest Lecture 10 |