Sanchari Das
Title
Cited by
Cited by
Year
Why johnny doesn’t use two factor a two-phase usability study of the fido u2f security key
S Das, A Dingman, LJ Camp
Proceedings of the International Conference on Financial Cryptography and …, 2018
682018
Evaluating User Perception of Multi-Factor Authentication: A Systematic Review
S Das, B Wang, Z Tingle, LJ Camp
arXiv preprint arXiv:1908.05901, 2019
242019
A qualitative study on usability and acceptability of Yubico security key
S Das, G Russo, AC Dingman, J Dev, O Kenny, LJ Camp
Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and …, 2018
232018
All About Phishing: Exploring User Research through a Systematic Literature Review
S Das, A Kim, Z Tingle, C Nippert-Eng
arXiv preprint arXiv:1908.05897, 2019
222019
Towards Implementing Inclusive Authentication Technologies for Older Adults
S Das, A Kim, B Jelen, J Streiff, LJ Camp, L Huber
Who Are You, 2019
192019
MFA is a Waste of Time! Understanding Negative Connotation Towards MFA Applications via User Generated Content
S Das, B Wang, LJ Camp
Proceedings of the Thriteenth International Symposium on Human Aspects of …, 2019
152019
Modularity is the Key A New Approach to Social Media Privacy Policies
S Das, J Dev, K Srinivasan
Proceedings of the 7th Mexican Conference on Human-Computer Interaction, 13, 2018
112018
How Celebrities Feed Tweeples with Personal and Promotional Tweets: Celebrity Twitter Use and Audience Engagement
S Das, J Goard, D Murray
Proceedings of the 8th International Conference on Social Media & Society, 30, 2017
112017
Evaluating the Impact of COVID-19 on Cyberbullying through Bayesian Trend Analysis
S Karmakar, S Das
Proceedings of The European Interdisciplinary Cybersecurity Conference (EICC …, 2020
102020
Change-Point Analysis of Cyberbullying-Related Twitter Discussions During COVID-19
S Das, A Kim, S Karmakar
Proceedings of the 16th Annual Social Informatics Research Symposium …, 2020
102020
User-Centered Risk Communication for Safer Browsing
S Das, J Abbott, S Gopavaram, J Blythe, LJ Camp
Proceedings of the First Asia USEC-Workshop on Usable Security, In …, 2020
102020
Personalized WhatsApp Privacy: Demographic and Cultural Influences on Indian and Saudi Users
LJ Camp, J Dev, S Das, Y Rashidi
Available at SSRN, 2019
9*2019
Techies Against Facebook: Understanding Negative Sentiment Toward Facebook via User Generated Content
ASM Noman, S Das, S Patil
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
92019
Privacy Practices, Preferences, and Compunctions WhatsApp Users in India
J Dev, S Das, J Camp
Human Aspects of Information Security & Assurance, 2018
92018
Why Don’t Older Adults Adopt Two-Factor Authentication?
S Das, A Kim, B Jelen, J Streiff, LJ Camp, L Huber
Das, S., Kim, A., Jelen, B., Streiff, J., Camp, LJ, & Huber, L.(2020, April …, 2020
62020
A Risk-reduction-based Incentivization Model for Human-centered Multi-factor Authentication
S Das
Indiana University, 2020
62020
MFA is A Necessary Chore!: Exploring User Mental Models of Multi-Factor Authentication Technologies
S Das, B Wang, A Kim, LJ Camp
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
52020
Who's Watching Your Child? Exploring Home Security Risks with Smart Toy Bears
J Streiff, O Kenny, S Das, A Leeth, LJ Camp
2018 IEEE/ACM Third International Conference on Internet-of-Things Design …, 2018
52018
Security Mandates are Pervasive: An Inter-School Study on Analyzing User Authentication Behavior
S Das, A Kim, S Mare, J Streiff, LJ Camp
IEEE Humans and Cyber Security Workshop (HACS 2019), 2019
42019
IoTMarketplace: Informing Purchase Decisions with Risk Communication
SR Gopavaram, J Dev, S Das, J Camp
4
The system can't perform the operation now. Try again later.
Articles 1–20