Joshua Streiff

Indiana University Bloomington, School of Informatics and Computing, Students

MS Student

Bloomington, IN

United States

SCHOLARLY PAPERS

5

DOWNLOADS

1,322

TOTAL CITATIONS

11

Scholarly Papers (5)

1.

Why Don’t Older Adults Adopt Two-Factor Authentication?

Proceedings of the 2020 SIGCHI Workshop on Designing Interactions for the Ageing Populations - Addressing Global Challenges.
Number of pages: 5 Posted: 11 May 2020 Last Revised: 01 Jul 2020
George Mason University, Indiana University Bloomington, Indiana University Bloomington, Indiana University Bloomington, School of Informatics and Computing, Students, Indiana University Bloomington - School of Informatics and Computing and Indiana University Bloomington
Downloads 672 (83,957)
Citation 4

Abstract:

Loading...

Authentication, Security, Older Adults

2.

Towards Implementing Inclusive Authentication Technologies for Older Adults

Who Are You?! Adventures in Authentication (WAY) 2019
Number of pages: 5 Posted: 19 Aug 2019
George Mason University, Indiana University Bloomington, Indiana University Bloomington, Indiana University Bloomington, School of Informatics and Computing, Students, Indiana University Bloomington - School of Informatics and Computing and Indiana University Bloomington
Downloads 327 (197,804)
Citation 1

Abstract:

Loading...

older adults, multi factor authentication, two factor authentication, inclusive design

3.

A Call for a New Privacy & Security Regime for IoT Smart Toys

In Proceedings of the 2022 IEEE Conference on Dependable and Secure Computing (IEEE DSC 2022)
Number of pages: 8 Posted: 18 Apr 2022
Joshua Streiff, Naheem Noah and Sanchari Das
Indiana University Bloomington, School of Informatics and Computing, Students, University of Denver and George Mason University
Downloads 160 (395,914)

Abstract:

Loading...

Privacy Policies, Cybersecurity Laws, Internet of Things, Smart Toys, COPPA, Case Studies, Vulnerable Population, Children.

4.

Overpowered and Underprotected Toys: Empowering Parents with Tools to Protect Their Children

IEEE Humans and Cyber Security Workshop (HACS 2019)
Number of pages: 8 Posted: 26 Jan 2020
Joshua Streiff, Sanchari Das and Joshua Cannon
Indiana University Bloomington, School of Informatics and Computing, Students, George Mason University and Indiana University Bloomington, School of Informatics and Computing, Students
Downloads 119 (502,344)
Citation 2

Abstract:

Loading...

Smart toys, Security information, Child-toy interaction, IoT, Design Principles, Usable Security, Children

5.

Security Mandates are Pervasive: An Inter-School Study on Analyzing User Authentication Behavior

IEEE Humans and Cyber Security Workshop (HACS 2019)
Number of pages: 8 Posted: 10 Jan 2020
George Mason University, Indiana University Bloomington, Indiana University Bloomington - School of Informatics and Computing, Indiana University Bloomington, School of Informatics and Computing, Students and Indiana University Bloomington - School of Informatics and Computing
Downloads 44 (886,508)
Citation 4

Abstract:

Loading...

Authentication, Two factor Authentication, Password, Mandatory Tools, User Studies, Educational Institutes