Why Johnny doesn’t use two factor a two-phase usability study of the FIDO U2F security key S Das, A Dingman, LJ Camp Financial Cryptography and Data Security: 22nd International Conference, FC …, 2018 | 136 | 2018 |
Evaluating user perception of multi-factor authentication: a systematic review S Das, B Wang, Z Tingle, LJ Camp arXiv preprint arXiv:1908.05901, 2019 | 74 | 2019 |
All about phishing: Exploring user research through a systematic literature review S Das, A Kim, Z Tingle, C Nippert-Eng arXiv preprint arXiv:1908.05897, 2019 | 59 | 2019 |
A qualitative study on usability and acceptability of yubico security key S Das, G Russo, AC Dingman, J Dev, O Kenny, LJ Camp Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and …, 2018 | 48 | 2018 |
Evaluating the impact of covid-19 on cyberbullying through bayesian trend analysis S Karmakar, S Das Proceedings of the 2020 European Interdisciplinary Cybersecurity Conference, 1-6, 2020 | 42 | 2020 |
Change-point analysis of cyberbullying-related twitter discussions during covid-19 S Das, A Kim, S Karmakar arXiv preprint arXiv:2008.13613, 2020 | 39 | 2020 |
Exploring evolution of augmented and virtual reality education space in 2020 through systematic literature review N Noah, S Das Computer Animation and Virtual Worlds 32 (3-4), e2020, 2021 | 35 | 2021 |
Understanding the rise of Twitter-based cyberbullying due to COVID-19 through comprehensive statistical evaluation S Karmakar, S Das Proceedings of the 54th Hawaii international conference on system sciences, 2021 | 33 | 2021 |
Mfa is a waste of time! understanding negative connotation towards mfa applications via user generated content S Das, B Wang, LJ Camp arXiv preprint arXiv:1908.05902, 2019 | 33 | 2019 |
Exploring gender biases in ML and AI academic research through systematic literature review S Shrestha, S Das Frontiers in artificial intelligence 5, 976838, 2022 | 32 | 2022 |
Evaluating user susceptibility to phishing attacks S Das, C Nippert-Eng, LJ Camp Information & Computer Security 30 (1), 1-18, 2022 | 31 | 2022 |
Towards implementing inclusive authentication technologies for older adults S Das, A Kim, B Jelen, J Streiff, LJ Camp, L Huber Who Are You, 2019 | 30 | 2019 |
A literature review on virtual reality authentication JM Jones, R Duezguen, P Mayer, M Volkamer, S Das Human Aspects of Information Security and Assurance: 15th IFIP WG 11.12 …, 2021 | 26 | 2021 |
User-centered risk communication for safer browsing S Das, J Abbott, S Gopavaram, J Blythe, LJ Camp Financial Cryptography and Data Security: FC 2020 International Workshops …, 2020 | 23 | 2020 |
Towards secure and usable authentication for augmented and virtual reality head-mounted displays R Duezguen, P Mayer, S Das, M Volkamer arXiv preprint arXiv:2007.11663, 2020 | 21 | 2020 |
Towards secure and usable authentication for augmented and virtual reality head-mounted displays R Duezguen, P Mayer, S Das, M Volkamer arXiv preprint arXiv:2007.11663, 2020 | 21 | 2020 |
Why Don’t Older Adults Adopt Two-Factor Authentication? S Das, A Kim, B Jelen, J Streiff, LJ Camp, L Huber Proceedings of the 2020 SIGCHI Workshop on Designing Interactions for the …, 2020 | 20 | 2020 |
Privacy Practices, Preferences, and Compunctions: WhatsApp Users in India. J Dev, S Das, LJ Camp HAISA, 135-146, 2018 | 20 | 2018 |
Non-inclusive online security: older adults' experience with two-factor authentication S Das, A Kim, B Jelen, L Huber, LJ Camp Proceedings of the 54th Hawaii International Conference on System Sciences, 2020 | 19 | 2020 |
Modularity is the key a new approach to social media privacy policies S Das, J Dev, K Srinivasan Proceedings of the 7th Mexican Conference on Human-Computer Interaction, 1-4, 2018 | 19 | 2018 |