Andrew Kim

Indiana University Bloomington

Dept of Biology

100 South Indiana Ave.

Bloomington, IN 47405

United States

SCHOLARLY PAPERS

8

DOWNLOADS

382

SSRN CITATIONS

11

CROSSREF CITATIONS

0

Scholarly Papers (8)

1.

Why Don’t Older Adults Adopt Two-Factor Authentication?

Proceedings of the 2020 SIGCHI Workshop on Designing Interactions for the Ageing Populations - Addressing Global Challenges.
Number of pages: 5 Posted: 11 May 2020 Last Revised: 01 Jul 2020
University of Denver, Indiana University Bloomington, Indiana University Bloomington, Indiana University Bloomington, School of Informatics and Computing, Students, Indiana University Bloomington - School of Informatics and Computing and Indiana University Bloomington
Downloads 118 (284,907)
Citation 1

Abstract:

Loading...

Authentication, Security, Older Adults

2.

Change-Point Analysis of Cyberbullying-Related Twitter Discussions During COVID-19

Proceedings of the 16th Annual Social Informatics Research Symposium (“Sociotechnical Change Agents: ICTs, Sustainability, and Global Challenges”) in Conjunction with the 83rd Association for Information Science and Technology (ASIS&T), 2020.
Number of pages: 12 Posted: 11 Aug 2020
Sanchari Das, Andrew Kim and Sayar Karmakar
University of Denver, Indiana University Bloomington and University of Florida
Downloads 76 (377,432)

Abstract:

Loading...

twitter, cyberbullying, social media, time series, change-point, COVID-19, pandemic

3.

Towards Implementing Inclusive Authentication Technologies for Older Adults

Who Are You?! Adventures in Authentication (WAY) 2019
Number of pages: 5 Posted: 19 Aug 2019
University of Denver, Indiana University Bloomington, Indiana University Bloomington, Indiana University Bloomington, School of Informatics and Computing, Students, Indiana University Bloomington - School of Informatics and Computing and Indiana University Bloomington
Downloads 58 (434,701)
Citation 1

Abstract:

Loading...

older adults, multi factor authentication, two factor authentication, inclusive design

4.

Non-Inclusive Online Security: Older Adults' Experience with Two-Factor Authentication

In Proceedings of the 54th Hawaii International Conference on System Sciences.
Number of pages: 10 Posted: 12 Nov 2020
University of Denver, Indiana University Bloomington, Indiana University Bloomington, Indiana University Bloomington and Indiana University Bloomington - School of Informatics and Computing
Downloads 50 (464,757)

Abstract:

Loading...

Older Adults, Authentication, Password, Multi-Factor Authentication, Hardware Token, Security

5.

Organizational Security: Implementing a Risk-Reduction-Based Incentivization Model for MFA Adoption

In Proceedings of the International Conference on Financial Cryptography and Data Security, March, 2021, Grenada (Virtual).
Number of pages: 8 Posted: 19 Jan 2021
Sanchari Das, Andrew Kim and L. Jean Camp
University of Denver, Indiana University Bloomington and Indiana University Bloomington - School of Informatics and Computing
Downloads 27 (576,417)

Abstract:

Loading...

Authentication, Multi-Factor Authentication, Risk Communication, User Studies, Organizational Security

6.

All About Phishing Exploring User Research through a Systematic Literature Review

In Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019)
Number of pages: 10 Posted: 19 Aug 2019 Last Revised: 07 Jul 2020
University of Denver, Indiana University Bloomington, Indiana University Bloomington and Indiana University Bloomington
Downloads 24 (595,577)
Citation 5

Abstract:

Loading...

Phishing, Literature Review, Authentication, Human Factors

7.

Security Mandates are Pervasive: An Inter-School Study on Analyzing User Authentication Behavior

IEEE Humans and Cyber Security Workshop (HACS 2019)
Number of pages: 8 Posted: 10 Jan 2020
University of Denver, Indiana University Bloomington, Indiana University Bloomington - School of Informatics and Computing, Indiana University Bloomington, School of Informatics and Computing, Students and Indiana University Bloomington - School of Informatics and Computing
Downloads 15 (657,710)
Citation 2

Abstract:

Loading...

Authentication, Two factor Authentication, Password, Mandatory Tools, User Studies, Educational Institutes

8.

Quantifying Susceptibility to Spear Phishing in a High School Environment Using Signal Detection Theory

Proceedings of the Fourteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2020)
Number of pages: 10 Posted: 07 Jul 2020 Last Revised: 08 Jul 2020
affiliation not provided to SSRN, University of Denver, Indiana University Bloomington and Indiana University Bloomington - School of Informatics and Computing
Downloads 14 (665,024)
Citation 1

Abstract:

Loading...

Phishing, Spear Phishing, High School, User Study, Usable Security