Joshua Streiff

Indiana University Bloomington, School of Informatics and Computing, Students

MS Student

Bloomington, IN

United States

SCHOLARLY PAPERS

4

DOWNLOADS

246

SSRN CITATIONS

5

CROSSREF CITATIONS

0

Scholarly Papers (4)

1.

Why Don’t Older Adults Adopt Two-Factor Authentication?

Proceedings of the 2020 SIGCHI Workshop on Designing Interactions for the Ageing Populations - Addressing Global Challenges.
Number of pages: 5 Posted: 11 May 2020 Last Revised: 01 Jul 2020
University of Denver, Indiana University Bloomington, Indiana University Bloomington, Indiana University Bloomington, School of Informatics and Computing, Students, Indiana University Bloomington - School of Informatics and Computing and Indiana University Bloomington
Downloads 118 (284,833)
Citation 1

Abstract:

Loading...

Authentication, Security, Older Adults

2.

Towards Implementing Inclusive Authentication Technologies for Older Adults

Who Are You?! Adventures in Authentication (WAY) 2019
Number of pages: 5 Posted: 19 Aug 2019
University of Denver, Indiana University Bloomington, Indiana University Bloomington, Indiana University Bloomington, School of Informatics and Computing, Students, Indiana University Bloomington - School of Informatics and Computing and Indiana University Bloomington
Downloads 58 (434,563)
Citation 1

Abstract:

Loading...

older adults, multi factor authentication, two factor authentication, inclusive design

3.

Overpowered and Underprotected Toys: Empowering Parents with Tools to Protect Their Children

IEEE Humans and Cyber Security Workshop (HACS 2019)
Number of pages: 8 Posted: 26 Jan 2020
Joshua Streiff, Sanchari Das and Joshua Cannon
Indiana University Bloomington, School of Informatics and Computing, Students, University of Denver and Indiana University Bloomington, School of Informatics and Computing, Students
Downloads 55 (445,538)
Citation 1

Abstract:

Loading...

Smart toys, Security information, Child-toy interaction, IoT, Design Principles, Usable Security, Children

4.

Security Mandates are Pervasive: An Inter-School Study on Analyzing User Authentication Behavior

IEEE Humans and Cyber Security Workshop (HACS 2019)
Number of pages: 8 Posted: 10 Jan 2020
University of Denver, Indiana University Bloomington, Indiana University Bloomington - School of Informatics and Computing, Indiana University Bloomington, School of Informatics and Computing, Students and Indiana University Bloomington - School of Informatics and Computing
Downloads 15 (657,512)
Citation 2

Abstract:

Loading...

Authentication, Two factor Authentication, Password, Mandatory Tools, User Studies, Educational Institutes