[ Publications of year 2019 ]
Articles in journals or book chapters (3) |
-
L. Jean Camp and Sanchari Das.
Studies of 2FA, Why Johnny Can’t Use 2FA and How We Can Change That?.
In .
Springer US,
March 2019.
Keywords: 2FA, authentication, human factors, usability. [bibtex-entry] -
Hamid Mehmood,
Tallal Ahmad,
Lubna Razaq,
Shrirang Mare,
Maryem Zafar Usmani,
Richard J. Anderson,
and Agha Ali Raza.
Towards Digitization of Collaborative Savings Among Low-Income Groups.
Proceedings of the ACM on Human-Computer Interaction (PACM HCI),
3(CSCW),
November 2019.
Keywords: referred. [bibtex-entry] -
Shakthidhar Reddy Gopavaram,
Jayati Dev,
Sanchari Das,
and Jean Camp.
IoTMarketplace: Informing Purchase Decisions with Risk Communication.
2019.
Keywords: IoT, Mental Models, Mobile Privacy. [bibtex-entry]
Conference publications (16) |
-
Sanchari Das,
Andrew Kim,
Shrirang Mare,
Joshua Streiff,
and L. Jean Camp.
Security Mandates are Pervasive: An Inter-School Study on Analyzing User Authentication Behavior.
In Proceedings of the IEEE Humans and Cyber Security Workshop,
December 2019.
Keywords: referred. [bibtex-entry] -
Vafa Andalibi,
DongInn Kim,
and L. Jean Camp.
Throwing MUD into the FOG: Defending IoT and Fog by expanding MUD to Fog network.
In 2nd USENIX Workshop on Hot Topics in Edge Computing (HotEdge 19),
Renton, WA,
July 2019.
USENIX Association.
Keywords: MUD, IoT. [bibtex-entry] -
Hilda Hadan,
Nicolas Serrano,
Sanchari Das,
and L. Jean Camp.
Making IoT Worthy of Human Trust.
In Social Science Research Network,
07 2019.
Keywords: PKI. [bibtex-entry] -
Fahad Pervaiz,
Rai Shah Nawaz,
Muhammad Umer Ramzan,
Maryem Zafar Usmani,
Shrirang Mare,
Kurtis Heimerl,
Faisal Kamiran,
Richard J. Anderson,
and Lubna Razaq.
An Assessment of SMS Fraud in Pakistan.
In Proceedings of the ACM SIGCAS Conference on Computing and Sustainable Societies (COMPASS),
July 2019.
Keywords: referred. [bibtex-entry] -
Aditya Vashistha,
Richard J. Anderson,
and Shrirang Mare.
Examining the Use and Non-Use of Mobile Payment Systems for Merchant Payments in India.
In Proceedings of the ACM SIGCAS Conference on Computing and Sustainable Societies (COMPASS),
July 2019.
Keywords: referred. [bibtex-entry] -
Jonathan Schubauer,
Anjanette Raymond,
and Dhruv Madappa.
Over-Priviliged Permission: Using Technology and Design to Create Privacy Compliance.
In ,
June 2019.
IACL.
Keywords: Mobile Privacy, Governance, Privacy. [bibtex-entry] -
Shrirang Mare,
Logan Girvin,
Franziska Roesner,
and Tadayoshi Kohno.
Consumer Smart Homes: Where We Are and Where We Need to Go.
In Proceedings of the Workshop on Mobile Computing Systems and Applications (HotMobile),
February 2019.
Keywords: referred. [bibtex-entry] -
Shrirang Mare,
Reza Rawassizadeh,
Ronald Peterson,
and David Kotz.
Continuous Smartphone Authentication using Wristbands.
In Proceedings of the Workshop on Usable Security and Privacy (USEC),
February 2019.
Keywords: workshop. [bibtex-entry] -
Jacob Abbott,
Gege Gao,
and Patrick Shih.
Creen: A Carbon Footprint Calculator Designed for Calculation in Context.
In International Conference on Information,
pages 769--776,
2019.
Springer.
Keywords: Sustainability, IoT, HCI. [bibtex-entry] -
Jacob Abbott,
Novia Nurain Haley MacLeod,
Gustave Ekobe,
and Sameer Patil.
Local Standards for Anonymization Practices in Health, Wellness, Accessibility, and Aging Research at CHI.
In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems,
2019.
ACM.
Keywords: Health, Privacy, Anonymization. [bibtex-entry] -
Sanchari Das,
Andrew Kim,
Shrirang Mare,
Joshua Streiff,
and L Jean Camp.
Security Mandates are Pervasive: An Inter-School Study on Analyzing User Authentication Behavior.
In IEEE HUMANS AND CYBER SECURITY WORKSHOP (HACS 2019),
2019.
IEEE.
Keywords: 2FA. [bibtex-entry] -
Sanchari Das,
Joshua Streiff,
Lisa Huber,
and L Jean Camp.
WHY DON'T ELDERS ADOPT TWO-FACTOR AUTHENTICATION? BECAUSE THEY ARE EXCLUDED BY DESIGN.
In Innovation in Aging, Volume 3, Issue Supplement_1, November 2019,
pages S325–S326,
2019.
GOA.
Keywords: 2FA. [bibtex-entry] -
Nicolas Serrano,
Hilda Hadan,
and L. Jean Camp.
A Complete Study of P.K.I. (PKI’s Known Incidents).
In The 47th Research Conference on Communications, Information, and Internet Policy,
2019.
TPRC.
Keywords: PKI. [bibtex-entry] -
Kushal Shah,
Shrirang Mare,
and Richard J. Anderson.
Understanding Mobile Money Grievances from Tweets.
In Proceedings of the International Conference on Information and Communication Technologies and Development (ICTD),
January 2019.
Keywords: poster. [bibtex-entry] -
Joshua Streiff,
Sanchari Das,
and Joshua Cannon.
Overpowered and Underprotected Toys Empowering Parents with Tools to Protect Their Children.
In IEEE HUMANS AND CYBER SECURITY WORKSHOP (HACS 2019),
2019.
IEEE.
Keywords: IoT. [bibtex-entry] -
Joshua Streiff,
Connie Justice,
and L Jean Camp.
Escaping to Cybersecurity Education: Using Manipulative Challenges to Engage and Educate.
In Proceedings of the 13th European Conference on Games Based Learning,
pages 1046--1050,
2019.
ACPI.
Keywords: IoT. [bibtex-entry]
Posters and Presentations (12) |
-
Laura Calloway.
Corporate Infrastructural Expansion as Big Data Surveillance.
Presentation at Annual Meeting of Society For Social Studies Of Science (4S, 2019), New Orleans, Louisiana,
September 2019.
Keywords: privacy, policies, governance, surveillance. [bibtex-entry] -
Joshua Streiff.
Practical Cybersecurity and Manipulative Gaming Education.
A Flipping the Switch! Cybersecurity Workshop Session at Indiana Department of Education Workshop,
September 2019.
Keywords: IoT. [bibtex-entry] -
Joshua Streiff,
Vafa Andalibi,
and Sanchari Das.
Eyes In Your Child’s Bedroom: Exploiting Child Data Risks with Smart Toys.
A Bsides MSP Workshop,
September 2019.
Keywords: IoT. [bibtex-entry] -
Joshua Streiff,
Vafa Andalibi,
and Sanchari Das.
Securtle: The Security Turtle.
A Bsides STL Workshop,
September 2019.
Keywords: IoT. [bibtex-entry] -
Joshua Streiff.
Bears, Unicorns, & Crockpots, Oh My! An Introduction to Internet of Things (IoT) Threat Modeling Education.
An AI & Connected Conference Workshop,
September 2019.
Keywords: IoT. [bibtex-entry] -
Joshua Streiff.
Cybersecurity & You.
A Brown Co. Schools Speaker Series,
September 2019.
Keywords: K12. [bibtex-entry] -
Joshua Streiff.
Educational Hacking Using Command Line & Bluetooth Low Energy.
An Avon STEM Educator Leadership Day Workshop,
September 2019.
Keywords: IoT. [bibtex-entry] -
Niang Chin,
Joshua Streiff,
and Sameer Patil.
The Overly Friendly Crockpot.
Trusted CI Poster Session (IL),
July 2019.
Keywords: IoT. [bibtex-entry] -
Nathaly Reynaga,
Behnod Momensadeh,
Joshua Streiff,
and Sameer Patil.
The One Where Patty Trusted Her Printer: The Threat of IoT Printers.
IU GROUPS STEM Poster (IN),
July 2019.
Keywords: IoT. [bibtex-entry] -
Joshua Streiff.
Capturing Education: CTF and IoT in K-12 Education.
A Luddy Hall Pathfinders Workshop,
July 2019.
Keywords: IoT. [bibtex-entry] -
Jeremy Gummeson,
Mary Baker,
Animesh Srivastava,
and Shrirang Mare.
Controlling devices based on collocation of the devices on a user.
U.S. Patent 10,331,916,
June 2019.
Keywords: authentication, mhealth, patent, security, sensors, wearable. [bibtex-entry] -
DongInn Kim and L Jean Camp.
Block-Pi: Defending against Man In The Middle (MITM) Attacks at the Edge.
Society for Risk Analysis, SRA 2019, Buffalo NY,
June 2019.
Keywords: Phishing. [bibtex-entry]
BACK TO INDEX
Disclaimer:
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
Last modified: Mon Aug 19 14:38:55 2024
Author: teamhats.
This document was translated from BibTEX by bibtex2html and is customized by IU IoT House