Sanchari Das

University of Denver

2201 S. Gaylord St

Denver, CO 80208-2685

United States

SCHOLARLY PAPERS

47

DOWNLOADS
Rank 11,989

SSRN RANKINGS

Top 11,989

in Total Papers Downloads

6,234

SSRN CITATIONS
Rank 19,400

SSRN RANKINGS

Top 19,400

in Total Papers Citations

49

CROSSREF CITATIONS

4

Scholarly Papers (47)

1.

Understanding the Rise of Twitter-Based Cyberbullying Due to COVID-19 through Comprehensive Statistical Evaluation

In Proceedings of the 54th Hawaii International Conference on System Sciences. 2021, Maui, Hawaii (Virtual).
Number of pages: 11 Posted: 19 Jan 2021
Sayar Karmakar and Sanchari Das
University of Florida and University of Denver
Downloads 1,411 (20,903)
Citation 2

Abstract:

Loading...

COVID-19, pandemic, privacy, security, social media privacy, cyberbullying

2.

Evaluating the Impact of COVID-19 on Cyberbullying through Bayesian Trend Analysis

Proceedings of The European Interdisciplinary Cybersecurity Conference (EICC) co-located with European Cyber Week 2020
Number of pages: 6 Posted: 11 Aug 2020
Sayar Karmakar and Sanchari Das
University of Florida and University of Denver
Downloads 421 (105,569)
Citation 3

Abstract:

Loading...

cyberbullying, COVID-19, twitter, social media, time-series, change-point, bayesian, pandemic

3.

Security and Privacy Evaluation of Popular Augmented and Virtual Reality Technologies

In Proceedings of the 2022 IEEE International Conference on Metrology for eXtended Reality, Artificial Intelligence, and Neural Engineering (IEEE MetroXRAINE 2022)
Number of pages: 6 Posted: 27 Jul 2022
Naheem Noah, Sommer Shearer and Sanchari Das
University of Denver, University of Denver and University of Denver
Downloads 318 (144,249)

Abstract:

Loading...

Augmented Reality, Virtual Reality, Privacy, Cybersecurity

4.

Why Don’t Older Adults Adopt Two-Factor Authentication?

Proceedings of the 2020 SIGCHI Workshop on Designing Interactions for the Ageing Populations - Addressing Global Challenges.
Number of pages: 5 Posted: 11 May 2020 Last Revised: 01 Jul 2020
University of Denver, Indiana University Bloomington, Indiana University Bloomington, Indiana University Bloomington, School of Informatics and Computing, Students, Indiana University Bloomington - School of Informatics and Computing and Indiana University Bloomington
Downloads 318 (144,249)
Citation 2

Abstract:

Loading...

Authentication, Security, Older Adults

5.

Multi-Factor Authentication Application Assessment: Risk Assessment of Expert-Recommended MFA Mobile Applications

In Proceeding of the Who Are You?! Adventures in Authentication Workshop (WAY), co-located with 16th Symposium on Usable Privacy and Security (SOUPS 2021), August 08, 2021, Virtual. 2021.
Number of pages: 6 Posted: 21 Jul 2021
Kevin Jensen, Faiza Tazi and Sanchari Das
University of Denver, University of Denver and University of Denver
Downloads 316 (145,217)

Abstract:

Loading...

multi-factor authentication, authentication, cybersecurity, usability, mobile applications, security analysis

6.

Personalized WhatsApp Privacy: Demographic and Cultural Influences on Indian and Saudi Users

Number of pages: 34 Posted: 06 Jun 2019
Indiana University Bloomington - School of Informatics and Computing, University of Denver, affiliation not provided to SSRN and Indiana University Bloomington - School of Informatics and Computing
Downloads 254 (181,672)
Citation 8

Abstract:

Loading...

computing, privacy, security, gender, culture, social networks

7.

Non-Inclusive Online Security: Older Adults' Experience with Two-Factor Authentication

In Proceedings of the 54th Hawaii International Conference on System Sciences.
Number of pages: 10 Posted: 12 Nov 2020
University of Denver, Indiana University Bloomington, Indiana University Bloomington, Indiana University Bloomington and Indiana University Bloomington - School of Informatics and Computing
Downloads 238 (193,615)

Abstract:

Loading...

Older Adults, Authentication, Password, Multi-Factor Authentication, Hardware Token, Security

8.

A Literature Review on Virtual Reality Authentication

Proceedings of the Fifteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2021) - Virtual Conference
Number of pages: 10 Posted: 12 Jun 2021 Last Revised: 08 Jul 2021
University of Denver, Karlsruhe Institute of Technology, Karlsruhe Institute of Technology, Karlsruhe Institute of Technology and University of Denver
Downloads 196 (232,114)

Abstract:

Loading...

Virtual Reality, Authentication, Literature Review, User Studies

9.

SoK: A Systematic Literature Review of Bluetooth Security Threats and Mitigation Measures

In Proceedings of the International Symposium on Emerging Information Security and Applications (EISA) - Copenhagen, Denmark (2021)
Number of pages: 20 Posted: 17 Nov 2021
Sunny Shrestha, Esa Irby, Raghav Thapa and Sanchari Das
University of Denver, University of Denver, University of Denver and University of Denver
Downloads 184 (245,446)

Abstract:

Loading...

Bluetooth, Literature Review, Security Threats, Attack Mitigation, Wearable Devices

10.

MFA is a Waste of Time! Understanding Negative Connotation Towards MFA Applications via User Generated Content

In Proceedings of the Thriteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019)
Number of pages: 10 Posted: 19 Aug 2019
Sanchari Das, Bingxing Wang and L. Jean Camp
University of Denver, Indiana University Bloomington and Indiana University Bloomington - School of Informatics and Computing
Downloads 180 (250,193)
Citation 10

Abstract:

Loading...

Multi Factor Authentication, Sentiment Analysis, User Perception

11.

Organizational Security: Implementing a Risk-Reduction-Based Incentivization Model for MFA Adoption

In Proceedings of the International Conference on Financial Cryptography and Data Security, March, 2021, Grenada (Virtual).
Number of pages: 8 Posted: 19 Jan 2021
Sanchari Das, Andrew Kim and L. Jean Camp
University of Denver, Indiana University Bloomington and Indiana University Bloomington - School of Informatics and Computing
Downloads 171 (261,470)

Abstract:

Loading...

Authentication, Multi-Factor Authentication, Risk Communication, User Studies, Organizational Security

12.

Towards Implementing Inclusive Authentication Technologies for Older Adults

Who Are You?! Adventures in Authentication (WAY) 2019
Number of pages: 5 Posted: 19 Aug 2019
University of Denver, Indiana University Bloomington, Indiana University Bloomington, Indiana University Bloomington, School of Informatics and Computing, Students, Indiana University Bloomington - School of Informatics and Computing and Indiana University Bloomington
Downloads 153 (286,987)
Citation 1

Abstract:

Loading...

older adults, multi factor authentication, two factor authentication, inclusive design

13.

IoT Marketplace: Willingness-To-Pay vs. Willingness-To-Accept

In Proceedings of the 20th Annual Workshop on the Economics of Information Security (WEIS 2021).
Number of pages: 24 Posted: 25 Jun 2021
Indiana University Bloomington, Indiana University Bloomington - School of Informatics and Computing, University of Denver and Indiana University Bloomington - School of Informatics and Computing
Downloads 135 (317,135)
Citation 1

Abstract:

Loading...

Willingness-to-pay, Willingness-to-protect, Willingness-to-accept, Experimental economics, Privacy, Information security, Marketplace, IoT, Usable Privacy and Security, Endowment Effect

14.

SoK: A Proposal for Incorporating Accessible Gamified Cybersecurity Awareness Training Informed by a Systematic Literature Review

In Proceedings of the Workshop on Usable Security and Privacy (USEC) 2022 in Conjunction with Network and Distributed Systems Security (NDSS) Symposium 2022.
Number of pages: 13 Posted: 22 Mar 2022 Last Revised: 22 Jul 2022
Junibel and Sanchari Das
University of Denver and University of Denver
Downloads 131 (324,429)

Abstract:

Loading...

Disabled Community, Cybersecurity Awareness, Gamification

15.

Making IoT Worthy of Human Trust

TPRC47: The 47th Research Conference on Communication, Information and Internet Policy 2019
Number of pages: 12 Posted: 29 Jul 2019 Last Revised: 16 Aug 2019
University of Waterloo - Systems Design Engineering, Indiana University - Bloomington, School of Informatics, Computing & Engineering, University of Denver and Indiana University Bloomington - School of Informatics and Computing
Downloads 114 (358,970)
Citation 1

Abstract:

Loading...

IoT, PKI, Security, Privacy

16.

SOK: An Evaluation of Quantum Authentication Through Systematic Literature Review

In Proceedings of the Workshop on Usable Security and Privacy (USEC), 2021. May 07, Auckland, New Zealand (Virtual).
Number of pages: 10 Posted: 04 Jun 2021
Ritajit Majumdar and Sanchari Das
Indian Statistical Institute, Kolkata and University of Denver
Downloads 113 (361,208)
Citation 1

Abstract:

Loading...

Authentication, Quantum Authentication, Human Factors, Systematic Literature Review

17.

Change-Point Analysis of Cyberbullying-Related Twitter Discussions During COVID-19

Proceedings of the 16th Annual Social Informatics Research Symposium (“Sociotechnical Change Agents: ICTs, Sustainability, and Global Challenges”) in Conjunction with the 83rd Association for Information Science and Technology (ASIS&T), 2020.
Number of pages: 12 Posted: 11 Aug 2020
Sanchari Das, Andrew Kim and Sayar Karmakar
University of Denver, Indiana University Bloomington and University of Florida
Downloads 108 (372,757)

Abstract:

Loading...

twitter, cyberbullying, social media, time series, change-point, COVID-19, pandemic

18.

Privacy Preserving Policy Framework: User-Aware and User-Driven

TPRC47: The 47th Research Conference on Communication, Information and Internet Policy 2019
Number of pages: 11 Posted: 03 Sep 2019 Last Revised: 05 Sep 2019
Sanchari Das, Jayati Dev and L. Jean Camp
University of Denver, Indiana University Bloomington - School of Informatics and Computing and Indiana University Bloomington - School of Informatics and Computing
Downloads 103 (385,040)
Citation 1

Abstract:

Loading...

privacy policy, compliance, social media, Facebook, privacy preserving, human factors

19.

Location Data and COVID-19 Contact Tracing: How Data Privacy Regulations and Cell Service Providers Work In Tandem

In Proceedings of the Workshop on Usable Security and Privacy (USEC), 2021. May 07, Auckland, New Zealand (Virtual)
Number of pages: 10 Posted: 28 Mar 2021 Last Revised: 07 Apr 2021
Callie Monroe, Faiza Tazi and Sanchari Das
University of Denver, University of Denver and University of Denver
Downloads 100 (392,693)

Abstract:

Loading...

Mobile Location Data, Privacy Legislation, Privacy Regulations, COVID-19, Contact Tracing Applications, Data Privacy.

20.

Study Exploring Security Threats in Waste Phones a Life Cycle Based Approach

In 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation. IEEE.
Number of pages: 6 Posted: 04 Sep 2019
Biswajit Debnath, Sanchari Das and Ankita Das
Jadavpur University, University of Denver and Techno India University
Downloads 98 (397,970)
Citation 1

Abstract:

Loading...

21.

Cross-National Study on Phishing Resilience

In Proceedings of the Workshop on Usable Security and Privacy (USEC), 2021
Number of pages: 11 Posted: 04 Jun 2021
Indiana University Bloomington, Indiana University Bloomington - School of Informatics and Computing, CSIRO Data61, Indiana University, University of Denver and Indiana University Bloomington - School of Informatics and Computing
Downloads 93 (411,695)

Abstract:

Loading...

Phishing, Risk Assessment, Resilience, Cyber Security, Usability, Cross-National, Socio-Technical

22.

Exploring The Security Issues in Home-Based IoT Devices Through Denial of Service Attacks

IEEE International Conference on Smart City Innovations, Forthcoming
Number of pages: 9 Posted: 24 Aug 2021 Last Revised: 11 Sep 2021
Otily Toutsop, Sanchari Das and Kevin Kornegay
Morgan State University, University of Denver and Morgan State University
Downloads 78 (457,672)

Abstract:

Loading...

Denial of Service (DoS) attack, Home Automation, Internet of Things (IoT), TCP SYN Flood, smart devices, smart home, Z-WAVE protocol

23.

Overpowered and Underprotected Toys: Empowering Parents with Tools to Protect Their Children

IEEE Humans and Cyber Security Workshop (HACS 2019)
Number of pages: 8 Posted: 26 Jan 2020
Joshua Streiff, Sanchari Das and Joshua Cannon
Indiana University Bloomington, School of Informatics and Computing, Students, University of Denver and Indiana University Bloomington, School of Informatics and Computing, Students
Downloads 74 (471,524)
Citation 1

Abstract:

Loading...

Smart toys, Security information, Child-toy interaction, IoT, Design Principles, Usable Security, Children

24.

A Call for a New Privacy & Security Regime for IoT Smart Toys

In Proceedings of the 2022 IEEE Conference on Dependable and Secure Computing (IEEE DSC 2022)
Number of pages: 8 Posted: 18 Apr 2022
Joshua Streiff, Naheem Noah and Sanchari Das
Indiana University Bloomington, School of Informatics and Computing, Students, University of Denver and University of Denver
Downloads 72 (478,689)

Abstract:

Loading...

Privacy Policies, Cybersecurity Laws, Internet of Things, Smart Toys, COPPA, Case Studies, Vulnerable Population, Children.

25.

Exploring Evolution of Augmented and Virtual Reality Education Space in 2020 Through Systematic Literature Review

In Proceedings of the 34th International Conference on Computer Animation and Social Agents (CASA 2021), Virtual, July 2021.
Number of pages: 10 Posted: 19 Apr 2021
Naheem Noah and Sanchari Das
University of Denver and University of Denver
Downloads 69 (489,713)

Abstract:

Loading...

Augmented Reality, Virtual Reality, Online Education, Literature Review

26.

Can Johnny Really be Anonymous? Evaluation of User Data Privacy Within Tor

In Proceedings of the 6th Workshop on Technology and Consumer Protection (ConPro ’22) Co-located with the 43th IEEE Symposium on Security and Privacy (IEEE S&P), 2022
Number of pages: 7 Posted: 18 Apr 2022
Sean Meek, Ivan Rodrigue Holguin and Sanchari Das
University of Denver, University of Denver and University of Denver
Downloads 68 (493,477)

Abstract:

Loading...

Tor, Security Evaluation, Consumer Perception, Human Factors, Deanonymization

27.

User-Centered Risk Communication for Safer Browsing

In Proceedings of the First Asia USEC - Workshop on Usable Security, In Conjunction with the Twenty-Fourth International Conference International Conference on Financial Cryptography and Data Security 2020.
Number of pages: 13 Posted: 17 Feb 2020
University of Denver, Indiana University Bloomington - School of Informatics, Computing, and Engineering, Indiana University Bloomington, affiliation not provided to SSRN and Indiana University Bloomington - School of Informatics and Computing
Downloads 63 (513,250)
Citation 5

Abstract:

Loading...

Phishing, Risk Communication, Usable Privacy Security

28.

Sok: Evaluating Privacy and Security Vulnerabilities of Patients’ Data in Healthcare

In proceedings of the 11th International Workshop on Socio-Technical Aspects in Security and Trust STAST, Forthcoming
Number of pages: 29 Posted: 03 Nov 2021 Last Revised: 18 Nov 2021
University of Denver, affiliation not provided to SSRN, University of Washington and University of Denver
Downloads 57 (538,473)

Abstract:

Loading...

Literature Review, Healthcare Data Privacy and Security

29.

PhisherCop: Developing an NLP-Based Automated Tool for Phishing Detection

Human Factors and Ergonomics Society 66th International Annual Meeting (2022)
Number of pages: 5 Posted: 01 Jul 2022
Independent, University of Denver, University of Denver and University of Denver
Downloads 54 (552,078)

Abstract:

Loading...

30.

All About Phishing Exploring User Research through a Systematic Literature Review

In Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019)
Number of pages: 10 Posted: 19 Aug 2019 Last Revised: 07 Jul 2020
University of Denver, Indiana University Bloomington, Indiana University Bloomington and Indiana University Bloomington
Downloads 53 (556,718)
Citation 5

Abstract:

Loading...

Phishing, Literature Review, Authentication, Human Factors

31.

Smart Devices for Smart Cities in India Exploring Security Vulnerabilities of E-Waste Management

In 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation.
Number of pages: 6 Posted: 04 Sep 2019
Jadavpur University, University of Denver, Techno India University and RCC Institute of Information Technology
Downloads 49 (576,039)
Citation 1

Abstract:

Loading...

Smart Devices, Smart City, E-waste Management, Security Threats, Supply Chain, Indian Second-Hand Device Market.

32.

Evaluating User Perception of Multi-Factor Authentication: A Systematic Review

In Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019)
Number of pages: 10 Posted: 19 Aug 2019 Last Revised: 07 Jul 2020
University of Denver, Indiana University Bloomington, Indiana University Bloomington and Indiana University Bloomington - School of Informatics and Computing
Downloads 47 (585,960)
Citation 4

Abstract:

Loading...

Multi Factor Authentication, User Studies, Systematic Literature Review

33.

Poster: PhisherCop - An Automated Tool Using ML Classifiers for Phishing Detection

In Proceedings of the 43rd IEEE Symposium on Security and Privacy (IEEE S&P 2022)
Number of pages: 3 Posted: 19 May 2022
University of Denver, University of Denver, University of Denver and University of Denver
Downloads 46 (591,100)

Abstract:

Loading...

Phishing, privacy and security, user-centered, machine learning, automated detection tools, NLP

34.

My Account Is Compromised - What Do I Do? Towards an Intercultural Analysis of Account Remediation for Websites

In Proceedings of the Sixth Workshop on Inclusive Privacy and Security (WIPS 2021): In Association with the Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021).
Number of pages: 6 Posted: 21 Jul 2021
University of Denver, University of Denver, Ruhr-Universität Bochum and University of Denver
Downloads 44 (601,568)
Citation 1

Abstract:

Loading...

Social Media, Account Remediation, Web Services, Account Restoration

35.

Smart Storytelling: Video and Text Risk Communication to Increase MFA Acceptability

In 2020 IEEE Humans and Cyber Security Workshop (HACS 2020) in Association with the 6th IEEE International Conference on Collaboration and Internet Computing (CIC). IEEE, 2020.
Number of pages: 8 Posted: 12 Nov 2020
Sanchari Das, Shrirang Mare and L. Jean Camp
University of Denver, Indiana University Bloomington - School of Informatics and Computing and Indiana University Bloomington - School of Informatics and Computing
Downloads 43 (607,113)
Citation 2

Abstract:

Loading...

Authentication, Multi-Factor Authentication, Risk Communication, User Studies

36.

Building An Authentication Infrastructure — Designing a Two Factor Authentication Hardware Token with Form Factor that Encourages Engagement

Number of pages: 22 Posted: 01 Aug 2022 Last Revised: 04 Aug 2022
Indiana University Bloomington, School of Informatics and Computing, Students, Indiana University Bloomington - School of Informatics, Computing, and Engineering, University of Denver and Indiana University Bloomington - School of Informatics and Computing
Downloads 42 (612,626)

Abstract:

Loading...

2fa, authentication, risk communication, usability

37.

Development and Evaluation of Virtual Reality Classrooms Through User-Centered Design During COVID-19

In Proceedings of the SSPXR 2022 -Novel Challenges of Safety, Security and Privacy in Ex- tended Reality (CHI'22 Workshop)
Number of pages: 5 Posted: 20 Mar 2022 Last Revised: 08 Apr 2022
University of Denver, University of Denver, University of Denver and University of Denver
Downloads 36 (647,323)

Abstract:

Loading...

Virtual Reality, VR Classrooms, Online Education, Remote Learning, COVID-19

38.

On the Data Privacy, Security, and Risk Postures of IoT Mobile Companion Apps

In Proceedings of the 36th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec'22), Newark, NJ, USA.
Number of pages: 20 Posted: 09 Jun 2022
Worcester Polytechnic Institute (WPI), University of Denver, Colorado State University, Worcester Polytechnic Institute (WPI), Worcester Polytechnic Institute (WPI), Worcester Polytechnic Institute (WPI), University of Denver and Colorado State University
Downloads 31 (679,619)

Abstract:

Loading...

IoT security, IoT privacy, mobile security

39.

Quantifying Susceptibility to Spear Phishing in a High School Environment Using Signal Detection Theory

Proceedings of the Fourteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2020)
Number of pages: 10 Posted: 07 Jul 2020 Last Revised: 08 Jul 2020
Ploy Unchit, Sanchari Das, Andrew Kim and L. Jean Camp
affiliation not provided to SSRN, University of Denver, Indiana University Bloomington and Indiana University Bloomington - School of Informatics and Computing
Downloads 28 (701,103)
Citation 2

Abstract:

Loading...

Phishing, Spear Phishing, High School, User Study, Usable Security

40.

Security Mandates are Pervasive: An Inter-School Study on Analyzing User Authentication Behavior

IEEE Humans and Cyber Security Workshop (HACS 2019)
Number of pages: 8 Posted: 10 Jan 2020
University of Denver, Indiana University Bloomington, Indiana University Bloomington - School of Informatics and Computing, Indiana University Bloomington, School of Informatics and Computing, Students and Indiana University Bloomington - School of Informatics and Computing
Downloads 26 (715,979)
Citation 3

Abstract:

Loading...

Authentication, Two factor Authentication, Password, Mandatory Tools, User Studies, Educational Institutes

41.

SecureLD: Secure and Accessible Learning for Students with Disabilities

Proceedings of the 66th International Annual Meeting of the Human Factors and Ergonomics Society (2022)
Number of pages: 6 Posted: 08 Jul 2022 Last Revised: 28 Jul 2022
Sunny Shrestha, David M Thomas and Sanchari Das
University of Denver, Learning Effectiveness Program and University of Denver
Downloads 20 (764,621)

Abstract:

Loading...

Online Education, Privacy, Security, Learning Disability

42.

Panel: Humans and Technology for Inclusive Privacy and Security

In Proceedings of the Human Factors and Ergonomics Society Annual Meeting, October 2020, Online.
Number of pages: 4 Posted: 19 Jan 2021 Last Revised: 07 Apr 2021
University of Denver, Arizona State University (ASU), Arizona State University (ASU), University of Washington, University of California, Irvine - Department of Informatics, Indiana University Bloomington - School of Informatics and Computing and Oberlin College
Downloads 20 (764,621)
Citation 2

Abstract:

Loading...

Privacy, Security, Inclusivity

43.

Privacy and Security Evaluation of Mobile Payment Applications Through User-Generated Reviews

Workshop on Privacy in the Electronic Society (WPES ’22)
Number of pages: 15 Posted: 19 Oct 2022
Independent, affiliation not provided to SSRN, University of Denver and affiliation not provided to SSRN
Downloads 18 (781,615)

Abstract:

Loading...

e-payment security, mobile applications, review analysis, privacy

44.

Understanding User Perspective in a University Setting to Improve Biometric Authentication Adoption

9th Mexican International Conference on Human-Computer Interaction
Number of pages: 16 Posted: 19 Oct 2022
affiliation not provided to SSRN, affiliation not provided to SSRN, Independent and University of Denver
Downloads 16 (799,295)

Abstract:

Loading...

survey, biometric authentication, usability study, privacy and security, student perspective

45.

Privacy Policy Analysis with Sentence Classification

In Proceedings of The 19th Annual International Conference on Privacy, Security & Trust (PST2022): Fredericton, Canada / Virtual Conference
Number of pages: 10 Posted: 27 Jul 2022
Andrick Adhikari, Sanchari Das and Rinku Dewri
University of Denver, University of Denver and University of Denver
Downloads 16 (799,295)

Abstract:

Loading...

Automated Classification, Privacy Policy, Usable Privacy and Security, NLP

46.

User Perception and Actions Through Risk Analysis Concerning Cookies

3rd International Conference on Frontiers in Computing and Systems (COMSYS-2022)
Number of pages: 8 Posted: 09 Dec 2022
Matthew Wheeler, Suleiman Saka and Sanchari Das
affiliation not provided to SSRN, University of Denver and University of Denver
Downloads 9 (866,713)

Abstract:

Loading...

Cookies, Third-party Data Collection, Privacy Concerns, Risk Analysis, Targeted Advertisements

47.

Parents, Educators, and Caregivers Cybersecurity and Privacy Concerns for Remote Learning during COVID-19

In Proceedings of the International Conference of the Greece ACM SIGCHI Chapter (CHIGreece 2021) - Virtual
Posted: 28 Oct 2021 Last Revised: 10 Nov 2021
University of Denver, University of Denver, Independent, University of Denver and University of Denver

Abstract:

Loading...

Remote Learning, Online Education, Survey, Thematic Analysis, COVID-19, Parents, Educators, Caregivers