2201 S. Gaylord St
Denver, CO 80208-2685
United States
University of Denver
SSRN RANKINGS
in Total Papers Downloads
in Total Papers Citations
COVID-19, pandemic, privacy, security, social media privacy, cyberbullying
cyberbullying, COVID-19, twitter, social media, time-series, change-point, bayesian, pandemic
Augmented Reality, Virtual Reality, Privacy, Cybersecurity
Authentication, Security, Older Adults
multi-factor authentication, authentication, cybersecurity, usability, mobile applications, security analysis
computing, privacy, security, gender, culture, social networks
Older Adults, Authentication, Password, Multi-Factor Authentication, Hardware Token, Security
Virtual Reality, Authentication, Literature Review, User Studies
Bluetooth, Literature Review, Security Threats, Attack Mitigation, Wearable Devices
Multi Factor Authentication, Sentiment Analysis, User Perception
Authentication, Multi-Factor Authentication, Risk Communication, User Studies, Organizational Security
older adults, multi factor authentication, two factor authentication, inclusive design
Willingness-to-pay, Willingness-to-protect, Willingness-to-accept, Experimental economics, Privacy, Information security, Marketplace, IoT, Usable Privacy and Security, Endowment Effect
Disabled Community, Cybersecurity Awareness, Gamification
IoT, PKI, Security, Privacy
Authentication, Quantum Authentication, Human Factors, Systematic Literature Review
twitter, cyberbullying, social media, time series, change-point, COVID-19, pandemic
privacy policy, compliance, social media, Facebook, privacy preserving, human factors
Mobile Location Data, Privacy Legislation, Privacy Regulations, COVID-19, Contact Tracing Applications, Data Privacy.
Phishing, Risk Assessment, Resilience, Cyber Security, Usability, Cross-National, Socio-Technical
Denial of Service (DoS) attack, Home Automation, Internet of Things (IoT), TCP SYN Flood, smart devices, smart home, Z-WAVE protocol
Smart toys, Security information, Child-toy interaction, IoT, Design Principles, Usable Security, Children
Privacy Policies, Cybersecurity Laws, Internet of Things, Smart Toys, COPPA, Case Studies, Vulnerable Population, Children.
Augmented Reality, Virtual Reality, Online Education, Literature Review
Tor, Security Evaluation, Consumer Perception, Human Factors, Deanonymization
Phishing, Risk Communication, Usable Privacy Security
Literature Review, Healthcare Data Privacy and Security
Phishing, Literature Review, Authentication, Human Factors
Smart Devices, Smart City, E-waste Management, Security Threats, Supply Chain, Indian Second-Hand Device Market.
Multi Factor Authentication, User Studies, Systematic Literature Review
Phishing, privacy and security, user-centered, machine learning, automated detection tools, NLP
Social Media, Account Remediation, Web Services, Account Restoration
Authentication, Multi-Factor Authentication, Risk Communication, User Studies
2fa, authentication, risk communication, usability
Virtual Reality, VR Classrooms, Online Education, Remote Learning, COVID-19
IoT security, IoT privacy, mobile security
Phishing, Spear Phishing, High School, User Study, Usable Security
Authentication, Two factor Authentication, Password, Mandatory Tools, User Studies, Educational Institutes
Online Education, Privacy, Security, Learning Disability
Privacy, Security, Inclusivity
e-payment security, mobile applications, review analysis, privacy
survey, biometric authentication, usability study, privacy and security, student perspective
Automated Classification, Privacy Policy, Usable Privacy and Security, NLP
Cookies, Third-party Data Collection, Privacy Concerns, Risk Analysis, Targeted Advertisements
Remote Learning, Online Education, Survey, Thematic Analysis, COVID-19, Parents, Educators, Caregivers