[ Publications of Sanchari Das ]
Articles in journals or book chapters (6) |
-
Anne C. Tally,
Jacob Abbott,
Ashley Bochner,
Sanchari Das,
and Christena Nippert-Eng.
What Mid-Career Professionals Think, Know, and Feel About Phishing: Opportunities for University IT Departments to Better Empower Employees in Their Anti-Phishing Decisions.
Proc. ACM Hum.-Comput. Interact.,
7(CSCW1),
April 2023.
Keywords: anti-phishing training, work context, organizations, user studies, IT departments, workplace, phishing, human factors, anti-phishing policy, security, organizational security. [bibtex-entry] -
Sanchari Das,
Christena Nippert-Eng,
and L Jean Camp.
Evaluating user susceptibility to phishing attacks.
Information & Computer Security,
30(1):1--18,
2022.
Keywords: phishing, user studies. [bibtex-entry] -
L. Jean Camp and Sanchari Das.
Studies of 2FA, Why Johnny Can’t Use 2FA and How We Can Change That?.
In .
Springer US,
March 2019.
Keywords: 2FA, authentication, human factors, usability. [bibtex-entry] -
Shakthidhar Reddy Gopavaram,
Jayati Dev,
Sanchari Das,
and Jean Camp.
IoTMarketplace: Informing Purchase Decisions with Risk Communication.
2019.
Keywords: IoT, Mental Models, Mobile Privacy. [bibtex-entry] -
Jayati Dev,
Sanchari Das,
and Kaushik Srinivasan.
Modularity is the Key: A New Approach to Social Media Privacy Policies.
2018.
Keywords: Privacy, Social Network Privacy, human factors, internet governance. [bibtex-entry] -
Sanchari Das,
Gianpaolo Russo,
Andrew C Dingman,
Jayati Dev,
Olivia Kenny,
and L Jean Camp.
A Qualitative Study on Usability and Acceptability of Yubico Security Key.
2017.
Keywords: Privacy, two-factor authentication, human factors. [bibtex-entry]
Conference publications (18) |
-
Anne Clara Tally,
Jacob Abbott,
Ashley M Bochner,
Sanchari Das,
and Christena Nippert-Eng.
Tips, Tricks, and Training: Supporting Anti-Phishing Awareness among Mid-Career Office Workers Based on Employees’ Current Practices.
In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems,
CHI '23,
New York, NY, USA,
2023.
Association for Computing Machinery.
Keywords: phishing education, cybersecurity, informal learning, guerrilla learning, phishing, workplace, anti-phishing training, organizations, IT departments, security, work context, organizational security, qualitative user studies, human factors. [bibtex-entry] -
Joshua Streiff,
Naheem Noah,
and Sanchari Das.
A Call for a New Privacy and Security Regime for IoT Smart Toys.
In IEEE Conference on Dependable and Secure Computing (IEEE DSC 2022),
2022.
IEEE.
Keywords: IoT. [bibtex-entry] -
Zitao Zhang,
Jacob Abbott,
Sanchari Das,
and L. Jean Camp.
Building an Authentication Infrastructure — Designing a Two Factor Authentication Hardware Token with Form Factor that Encourages Engagement.
In TPRC 2022: The 50th Research Conference on Communication, Information and Internet Policy,
2022.
Social Science Research Network.
Keywords: Security, UX, 2FA. [bibtex-entry] -
Shakthidhar Gopavaram,
Jayati Dev,
Sanchari Das,
and L Jean Camp.
IoT Marketplace: Willingness-To-Pay vs. Willingness-To-Accept.
In Proceedings of the 20th Annual Workshop on the Economics of Information Security (WEIS 2021),
June 2021.
Keywords: IoT, Privacy Labels, Marketplace, Psychological Biases. [bibtex-entry] -
Shakthidhar Gopavaram,
Jayati Dev,
Marthie Grobler,
DongInn Kim,
Sanchari Das,
and L Jean Camp.
Cross-National Study on Phishing Resilience.
In Proceedings of the Workshop on Usable Security and Privacy (USEC),
May 2021.
Keywords: Phishing. [bibtex-entry] -
Sanchari Das,
Jacob Abbott,
Shakthidhar Gopavaram,
Jim Blythe,
and L Jean Camp.
User-Centered Risk Communication for Safer Browsing.
In Proceedings of the First Asia USEC-Workshop on Usable Security, In Conjunction with the Twenty-Fourth International Conference International Conference on Financial Cryptography and Data Security,
2020.
Keywords: Phishing, Risk Communication, Privacy, Security. [bibtex-entry] -
Behnood Momenzadeh,
Shakthidhar Gopavaram,
Sanchari Das,
and L Jean Camp.
Bayesian Evaluation of User App Choices in the Presence of Risk Communication on Android Devices.
In International Symposium on Human Aspects of Information Security and Assurance,
pages 211--223,
2020.
Springer.
Keywords: Mobile Privacy, Usable Privacy, Usability. [bibtex-entry] -
Sanchari Das,
Andrew Kim,
Shrirang Mare,
Joshua Streiff,
and L. Jean Camp.
Security Mandates are Pervasive: An Inter-School Study on Analyzing User Authentication Behavior.
In Proceedings of the IEEE Humans and Cyber Security Workshop,
December 2019.
Keywords: referred. [bibtex-entry] -
Hilda Hadan,
Nicolas Serrano,
Sanchari Das,
and L. Jean Camp.
Making IoT Worthy of Human Trust.
In Social Science Research Network,
07 2019.
Keywords: PKI. [bibtex-entry] -
Sanchari Das,
Andrew Kim,
Shrirang Mare,
Joshua Streiff,
and L Jean Camp.
Security Mandates are Pervasive: An Inter-School Study on Analyzing User Authentication Behavior.
In IEEE HUMANS AND CYBER SECURITY WORKSHOP (HACS 2019),
2019.
IEEE.
Keywords: 2FA. [bibtex-entry] -
Sanchari Das,
Joshua Streiff,
Lisa Huber,
and L Jean Camp.
WHY DON'T ELDERS ADOPT TWO-FACTOR AUTHENTICATION? BECAUSE THEY ARE EXCLUDED BY DESIGN.
In Innovation in Aging, Volume 3, Issue Supplement_1, November 2019,
pages S325–S326,
2019.
GOA.
Keywords: 2FA. [bibtex-entry] -
Joshua Streiff,
Sanchari Das,
and Joshua Cannon.
Overpowered and Underprotected Toys Empowering Parents with Tools to Protect Their Children.
In IEEE HUMANS AND CYBER SECURITY WORKSHOP (HACS 2019),
2019.
IEEE.
Keywords: IoT. [bibtex-entry] -
Sanchari Das,
Jayati Dev,
and Kaushik Srinivasan.
Modularity is the Key: A New Approach to Social Media Privacy Policies.
In ACM,
2018.
MEXIHC 2018.
Keywords: Privacy, Social Network Privacy, human factors, internet governance. [bibtex-entry] -
Sanchari Das,
Andrew Dingman,
and L. Jean Camp.
Why Johnny Doesn’t Use Two Factor A Two-Phase Usability Study of the FIDO U2F Security Key.
In 2018 International Conference on Financial Cryptography and Data Security (FC),
2018.
Keywords: 2FA. [bibtex-entry] -
Jayati Dev,
Sanchari Das,
and L Jean Camp.
Understanding privacy concerns of whatsapp users in India: poster.
In Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security,
pages 28,
2018.
ACM.
Keywords: Privacy, Cultural, Social Network Privacy, human factors. [bibtex-entry] -
Jayati Dev,
Sanchari Das,
and L Jean Camp.
Privacy Practices, Preferences, and Compunctions: WhatsApp Users in India.
In Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2018),
pages 135,
2018.
Lulu. com.
Keywords: Privacy, Cultural, Social Network Privacy, human factors. [bibtex-entry] -
Joshua Streiff,
Olivia Kenny,
Sanchari Das,
Andrew Leeth,
and L Jean Camp.
Who's Watching Your Child? Exploring Home Security Risks with Smart Toy Bears.
In Internet-of-Things Design and Implementation (IoTDI), 2018 IEEE/ACM Third International Conference on,
pages 285--286,
2018.
IEEE.
Keywords: IoT. [bibtex-entry] -
Sanchari Das,
Javon Goard,
and Dakota Murray.
How Celebrities Feed Tweeples with Personal and Promotional Tweets: Celebrity Twitter Use and Audience Engagement.
In Proceedings of the 8th International Conference on Social Media & Society,
pages 30,
2017.
ACM.
Keywords: Social Network. [bibtex-entry]
Posters and Presentations (4) |
-
Joshua Streiff,
Vafa Andalibi,
and Sanchari Das.
Eyes In Your Child’s Bedroom: Exploiting Child Data Risks with Smart Toys.
A Bsides MSP Workshop,
September 2019.
Keywords: IoT. [bibtex-entry] -
Joshua Streiff,
Vafa Andalibi,
and Sanchari Das.
Securtle: The Security Turtle.
A Bsides STL Workshop,
September 2019.
Keywords: IoT. [bibtex-entry] -
Sanchari Das,
DongInn Kim,
Timothy Kelley,
and L Jean Camp.
Grifting in the Digital Age, Analyzing Risk Communication Tools.
eCrime APWG 2018, Sandiego CA,
May 2018.
Keywords: Phishing. [bibtex-entry] -
Sanchari Das,
DongInn Kim,
Timothy Kelley,
and L Jean Camp.
Grifting in the Digital Age, Analyzing Risk Communication Tools.
Midwest Security Workshop 2018, Washington DC,
April 2018.
Keywords: Phishing. [bibtex-entry]
BACK TO INDEX
Disclaimer:
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
Last modified: Mon Aug 19 14:38:55 2024
Author: teamhats.
This document was translated from BibTEX by bibtex2html and is customized by IU IoT House