Andrew Kim

Indiana University Bloomington

Dept of Biology

100 South Indiana Ave.

Bloomington, IN 47405

United States

SCHOLARLY PAPERS

8

DOWNLOADS
Rank 43,132

SSRN RANKINGS

Top 43,132

in Total Papers Downloads

2,491

TOTAL CITATIONS
Rank 40,362

SSRN RANKINGS

Top 40,362

in Total Papers Citations

23

Scholarly Papers (8)

1.

Non-Inclusive Online Security: Older Adults' Experience with Two-Factor Authentication

In Proceedings of the 54th Hawaii International Conference on System Sciences.
Number of pages: 10 Posted: 12 Nov 2020
George Mason University, Indiana University Bloomington, Indiana University Bloomington, Indiana University Bloomington and Indiana University Bloomington - School of Informatics and Computing
Downloads 676 (83,279)
Citation 2

Abstract:

Loading...

Older Adults, Authentication, Password, Multi-Factor Authentication, Hardware Token, Security

2.

Why Don’t Older Adults Adopt Two-Factor Authentication?

Proceedings of the 2020 SIGCHI Workshop on Designing Interactions for the Ageing Populations - Addressing Global Challenges.
Number of pages: 5 Posted: 11 May 2020 Last Revised: 01 Jul 2020
George Mason University, Indiana University Bloomington, Indiana University Bloomington, Indiana University Bloomington, School of Informatics and Computing, Students, Indiana University Bloomington - School of Informatics and Computing and Indiana University Bloomington
Downloads 672 (83,858)
Citation 4

Abstract:

Loading...

Authentication, Security, Older Adults

3.

Organizational Security: Implementing a Risk-Reduction-Based Incentivization Model for MFA Adoption

In Proceedings of the International Conference on Financial Cryptography and Data Security, March, 2021, Grenada (Virtual).
Number of pages: 8 Posted: 19 Jan 2021
Sanchari Das, Andrew Kim and L. Jean Camp
George Mason University, Indiana University Bloomington and Indiana University Bloomington - School of Informatics and Computing
Downloads 461 (134,182)

Abstract:

Loading...

Authentication, Multi-Factor Authentication, Risk Communication, User Studies, Organizational Security

4.

Towards Implementing Inclusive Authentication Technologies for Older Adults

Who Are You?! Adventures in Authentication (WAY) 2019
Number of pages: 5 Posted: 19 Aug 2019
George Mason University, Indiana University Bloomington, Indiana University Bloomington, Indiana University Bloomington, School of Informatics and Computing, Students, Indiana University Bloomington - School of Informatics and Computing and Indiana University Bloomington
Downloads 327 (197,565)
Citation 1

Abstract:

Loading...

older adults, multi factor authentication, two factor authentication, inclusive design

5.

Change-Point Analysis of Cyberbullying-Related Twitter Discussions During COVID-19

Proceedings of the 16th Annual Social Informatics Research Symposium (“Sociotechnical Change Agents: ICTs, Sustainability, and Global Challenges”) in Conjunction with the 83rd Association for Information Science and Technology (ASIS&T), 2020.
Number of pages: 12 Posted: 11 Aug 2020
Sanchari Das, Andrew Kim and Sayar Karmakar
George Mason University, Indiana University Bloomington and University of Florida
Downloads 136 (451,546)

Abstract:

Loading...

twitter, cyberbullying, social media, time series, change-point, COVID-19, pandemic

6.

All About Phishing Exploring User Research through a Systematic Literature Review

In Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019)
Number of pages: 10 Posted: 19 Aug 2019 Last Revised: 07 Jul 2020
George Mason University, Indiana University Bloomington, Indiana University Bloomington and Indiana University Bloomington
Downloads 113 (521,661)
Citation 8

Abstract:

Loading...

Phishing, Literature Review, Authentication, Human Factors

7.

Quantifying Susceptibility to Spear Phishing in a High School Environment Using Signal Detection Theory

Proceedings of the Fourteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2020)
Number of pages: 10 Posted: 07 Jul 2020 Last Revised: 08 Jul 2020
affiliation not provided to SSRN, George Mason University, Indiana University Bloomington and Indiana University Bloomington - School of Informatics and Computing
Downloads 62 (752,286)
Citation 4

Abstract:

Loading...

Phishing, Spear Phishing, High School, User Study, Usable Security

8.

Security Mandates are Pervasive: An Inter-School Study on Analyzing User Authentication Behavior

IEEE Humans and Cyber Security Workshop (HACS 2019)
Number of pages: 8 Posted: 10 Jan 2020
George Mason University, Indiana University Bloomington, Indiana University Bloomington - School of Informatics and Computing, Indiana University Bloomington, School of Informatics and Computing, Students and Indiana University Bloomington - School of Informatics and Computing
Downloads 44 (885,078)
Citation 4

Abstract:

Loading...

Authentication, Two factor Authentication, Password, Mandatory Tools, User Studies, Educational Institutes