Sanchari Das

Indiana University Bloomington, School of Informatics and Computing

Doctoral Candidate

Bloomington, IN

United States

SCHOLARLY PAPERS

12

DOWNLOADS

248

SSRN CITATIONS

8

CROSSREF CITATIONS

0

Scholarly Papers (12)

1.

Privacy Preserving Policy Framework: User-Aware and User-Driven

Number of pages: 11 Posted: 03 Sep 2019 Last Revised: 05 Sep 2019
Sanchari Das, Jayati Dev and L. Jean Camp
Indiana University Bloomington, School of Informatics and Computing, Indiana University Bloomington - School of Informatics and Computing and Indiana University Bloomington - School of Informatics and Computing
Downloads 49 (417,652)

Abstract:

Loading...

privacy policy, compliance, social media, Facebook, privacy preserving, human factors

2.

Making IoT Worthy of Human Trust

Number of pages: 12 Posted: 29 Jul 2019 Last Revised: 16 Aug 2019
Indiana University Bloomington - School of Informatics, Computing & Engineering, Indiana University - Bloomington, School of Informatics, Computing & Engineering, Indiana University Bloomington, School of Informatics and Computing and Indiana University Bloomington - School of Informatics and Computing
Downloads 49 (421,312)

Abstract:

Loading...

IoT, PKI, Security, Privacy

3.

Overpowered and Underprotected Toys: Empowering Parents with Tools to Protect Their Children

IEEE Humans and Cyber Security Workshop (HACS 2019)
Number of pages: 8 Posted: 26 Jan 2020
Joshua Streiff, Sanchari Das and Joshua Cannon
Indiana University Bloomington, School of Informatics and Computing, Students, Indiana University Bloomington, School of Informatics and Computing and Indiana University Bloomington, School of Informatics and Computing, Students
Downloads 34 (478,915)

Abstract:

Loading...

Smart toys, Security information, Child-toy interaction, IoT, Design Principles, Usable Security, Children

4.

Towards Implementing Inclusive Authentication Technologies for Older Adults

Who Are You?! Adventures in Authentication (WAY) 2019
Number of pages: 5 Posted: 19 Aug 2019
Indiana University Bloomington, School of Informatics and Computing, Indiana University Bloomington, Indiana University Bloomington, Indiana University Bloomington, School of Informatics and Computing, Students, Indiana University Bloomington - School of Informatics and Computing and Indiana University Bloomington
Downloads 26 (520,149)

Abstract:

Loading...

older adults, multi factor authentication, two factor authentication, inclusive design

5.

Study Exploring Security Threats in Waste Phones a Life Cycle Based Approach

In 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation. IEEE.
Number of pages: 6 Posted: 04 Sep 2019
Biswajit Debnath, Sanchari Das and Ankita Das
Jadavpur University, Indiana University Bloomington, School of Informatics and Computing and Techno India University
Downloads 21 (550,238)
Citation 1

Abstract:

Loading...

6.

MFA is a Waste of Time! Understanding Negative Connotation Towards MFA Applications via User Generated Content

In Proceedings of the Thriteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019)
Number of pages: 10 Posted: 19 Aug 2019
Sanchari Das, Bingxing Wang and L. Jean Camp
Indiana University Bloomington, School of Informatics and Computing, Indiana University Bloomington and Indiana University Bloomington - School of Informatics and Computing
Downloads 19 (569,053)
Citation 3

Abstract:

Loading...

Multi Factor Authentication, Sentiment Analysis, User Perception

7.

User-Centered Risk Communication for Safer Browsing

In Proceedings of the First Asia USEC - Workshop on Usable Security, In Conjunction with the Twenty-Fourth International Conference International Conference on Financial Cryptography and Data Security 2020.
Number of pages: 13 Posted: 17 Feb 2020
Indiana University Bloomington, School of Informatics and Computing, Indiana University Bloomington - School of Informatics, Computing, and Engineering, Indiana University Bloomington, affiliation not provided to SSRN and Indiana University Bloomington - School of Informatics and Computing
Downloads 12 (614,941)

Abstract:

Loading...

Phishing, Risk Communication, Usable Privacy Security

8.

Security Mandates are Pervasive: An Inter-School Study on Analyzing User Authentication Behavior

IEEE Humans and Cyber Security Workshop (HACS 2019)
Number of pages: 8 Posted: 10 Jan 2020
Indiana University Bloomington, School of Informatics and Computing, Indiana University Bloomington, Indiana University Bloomington - School of Informatics and Computing, Indiana University Bloomington, School of Informatics and Computing, Students and Indiana University Bloomington - School of Informatics and Computing
Downloads 10 (628,433)

Abstract:

Loading...

Authentication, Two factor Authentication, Password, Mandatory Tools, User Studies, Educational Institutes

9.

All About Phishing Exploring User Research through a Systematic Literature Review

In Proceedings of the Thriteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019)
Number of pages: 10 Posted: 19 Aug 2019
Indiana University Bloomington, School of Informatics and Computing, Indiana University Bloomington, Indiana University Bloomington and Indiana University Bloomington
Downloads 10 (621,574)
Citation 2

Abstract:

Loading...

Phishing, Literature Review, Authentication, Human Factors

10.

Evaluating User Perception of Multi-Factor Authentication: A Systematic Review

In Proceedings of the Thriteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019)
Number of pages: 10 Posted: 19 Aug 2019
Indiana University Bloomington, School of Informatics and Computing, Indiana University Bloomington, Indiana University Bloomington and Indiana University Bloomington - School of Informatics and Computing
Downloads 9 (628,433)
Citation 1

Abstract:

Loading...

Multi Factor Authentication, User Studies, Systematic Literature Review

11.

Why Don’t Older Adults Adopt Two-Factor Authentication?

Das, S., Kim, A., Jelen, B., Streiff, J., Camp, L. J., & Huber, L. (2020, April). Why Don’t Older Adults Adopt Two-Factor Authentication? In Proceedings of the 2020 CHI Workshop on Designing Interactions for the Ageing Populations - Addressing Global Challenges.
Number of pages: 5 Posted: 11 May 2020
Indiana University Bloomington, School of Informatics and Computing, Indiana University Bloomington, Indiana University Bloomington, Indiana University Bloomington, School of Informatics and Computing, Students, Indiana University Bloomington - School of Informatics and Computing and Indiana University Bloomington
Downloads 6 (656,148)

Abstract:

Loading...

Authentication, Security, Older Adults

12.

Smart Devices for Smart Cities in India Exploring Security Vulnerabilities of E-Waste Management

In 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation.
Number of pages: 6 Posted: 04 Sep 2019
Jadavpur University, Indiana University Bloomington, School of Informatics and Computing, Techno India University and RCC Institute of Information Technology
Downloads 3 (670,987)
Citation 1

Abstract:

Loading...

Smart Devices, Smart City, E-waste Management, Security Threats, Supply Chain, Indian Second-Hand Device Market.