Sanchari Das
YOU?
Author Swipe
View article: Security and Privacy Assessment of U.S. and Non-U.S. Android E-Commerce Applications
Security and Privacy Assessment of U.S. and Non-U.S. Android E-Commerce Applications Open
E-commerce mobile applications are central to global financial transactions, making their security and privacy crucial. In this study, we analyze 92 top-grossing Android e-commerce apps (58 U.S.-based and 34 international) using MobSF, And…
View article: "Your Doctor is Spying on You": An Analysis of Data Practices in Mobile Healthcare Applications
"Your Doctor is Spying on You": An Analysis of Data Practices in Mobile Healthcare Applications Open
Mobile healthcare (mHealth) applications promise convenient, continuous patient-provider interaction but also introduce severe and often underexamined security and privacy risks. We present an end-to-end audit of 272 Android mHealth apps f…
View article: Multi-Tool Analysis of User Interface & Accessibility in Deployed Web-Based Chatbots
Multi-Tool Analysis of User Interface & Accessibility in Deployed Web-Based Chatbots Open
In this work, we present a multi-tool evaluation of 106 deployed web-based chatbots, across domains like healthcare, education and customer service, comprising both standalone applications and embedded widgets using automated tools (Google…
View article: TRIDENT -- A Three-Tier Privacy-Preserving Propaganda Detection Model in Mobile Networks using Transformers, Adversarial Learning, and Differential Privacy
TRIDENT -- A Three-Tier Privacy-Preserving Propaganda Detection Model in Mobile Networks using Transformers, Adversarial Learning, and Differential Privacy Open
The proliferation of propaganda on mobile platforms raises critical concerns around detection accuracy and user privacy. To address this, we propose TRIDENT - a three-tier propaganda detection model implementing transformers, adversarial l…
View article: POSTER: A Multi-Signal Model for Detecting Evasive Smishing
POSTER: A Multi-Signal Model for Detecting Evasive Smishing Open
Smishing, or SMS-based phishing, poses an increasing threat to mobile users by mimicking legitimate communications through culturally adapted, concise, and deceptive messages, which can result in the loss of sensitive data or financial res…
View article: A Study on Digital Competence of Graduate Students
A Study on Digital Competence of Graduate Students Open
The digital transformation in education has led to an increasing emphasis on the development of digital competence among graduate students. Digital competence encompasses a diverse range of skills necessary for navigating, utilizing, and c…
View article: Systemization of Knowledge (SoK): Goals, Coverage, and Evaluation in Cybersecurity and Privacy Games
Systemization of Knowledge (SoK): Goals, Coverage, and Evaluation in Cybersecurity and Privacy Games Open
This paper systematized existing knowledge on cybersecurity and privacy game-based approaches, exploring their goals, scope, and evaluation methods. Our review of 93 academic papers revealed that these approaches serve multiple purposes an…
View article: "Watch My Health, Not My Data": Understanding Perceptions, Barriers, Emotional Impact, & Coping Strategies Pertaining to IoT Privacy and Security in Health Monitoring for Older Adults
"Watch My Health, Not My Data": Understanding Perceptions, Barriers, Emotional Impact, & Coping Strategies Pertaining to IoT Privacy and Security in Health Monitoring for Older Adults Open
The proliferation of "Internet of Things (IoT)" provides older adults with critical support for "health monitoring" and independent living, yet significant concerns about security and privacy persist. In this paper, we report on these issu…
View article: "It's Like Not Being Able to Read and Write": Narrowing the Digital Divide for Older Adults and Leveraging the Role of Digital Educators in Ireland
"It's Like Not Being Able to Read and Write": Narrowing the Digital Divide for Older Adults and Leveraging the Role of Digital Educators in Ireland Open
As digital services increasingly replace traditional analogue systems, ensuring that older adults are not left behind is critical to fostering inclusive access. This study explores how digital educators support older adults in developing e…
View article: 'Debunk-It-Yourself': Health Professionals' Strategies for Responding to Misinformation on TikTok
'Debunk-It-Yourself': Health Professionals' Strategies for Responding to Misinformation on TikTok Open
Misinformation is "sticky" in nature, requiring a considerable effort to undo its influence. One such effort is debunking or exposing the falsity of information. As an abundance of misinformation is on social media, platforms do bear some …
View article: Enhancing Personalised Cybersecurity Guidance for Older Adults in Ireland
Enhancing Personalised Cybersecurity Guidance for Older Adults in Ireland Open
The term `Digital Divide' emerged in the mid-1990s, highlighting the gap between those with access to emerging information technologies and those without. This gap persists for older adults even in the 21st century. To address this, our st…
View article: Dual-Technique Privacy & Security Analysis for E-Commerce Websites Through Automated and Manual Implementation
Dual-Technique Privacy & Security Analysis for E-Commerce Websites Through Automated and Manual Implementation Open
As e-commerce continues to expand, the urgency for stronger privacy and security measures becomes increasingly critical, particularly on platforms frequented by younger users who are often less aware of potential risks. In our analysis of …
View article: Securing the Web: Analysis of HTTP Security Headers in Popular Global Websites
Securing the Web: Analysis of HTTP Security Headers in Popular Global Websites Open
The surge in website attacks, including Denial of Service (DoS), Cross-Site Scripting (XSS), and Clickjacking, underscores the critical need for robust HTTPS implementation-a practice that, alarmingly, remains inadequately adopted. Regardi…
View article: Evaluating Privacy Measures in Healthcare Apps Predominantly Used by Older Adults
Evaluating Privacy Measures in Healthcare Apps Predominantly Used by Older Adults Open
The widespread adoption of telehealth systems has led to a significant increase in the use of healthcare apps among older adults, but this rapid growth has also heightened concerns about the privacy of their health information. While HIPAA…
View article: Exploring Older Adults' Perceptions and Experiences with Online Dating
Exploring Older Adults' Perceptions and Experiences with Online Dating Open
The rise of online dating apps has transformed how individuals connect and seek companionship, with an increase in usage among older adults. While these platforms offer opportunities for emotional support and social connection, they also p…
View article: Design of Secure, Privacy-focused, and Accessible E-Payment Applications for Older Adults
Design of Secure, Privacy-focused, and Accessible E-Payment Applications for Older Adults Open
E-payments are essential for transactional convenience in today's digital economy and are becoming increasingly important for older adults, emphasizing the need for enhanced security, privacy, and usability. To address this, we conducted a…
View article: Improving Privacy and Security of Telehealth
Improving Privacy and Security of Telehealth Open
Dek : Multidisciplinary experts’ perspectives on how to strengthen protection of patients’ health information in telehealth designs and workflows.
View article: Towards Perceived Security, Perceived Privacy, and the Universal Design of E-Payment Applications
Towards Perceived Security, Perceived Privacy, and the Universal Design of E-Payment Applications Open
With the growth of digital monetary transactions and cashless payments, encouraged by the COVID-19 pandemic, use of e-payment applications is on the rise. It is thus imperative to understand and evaluate the current posture of e-payment ap…
View article: Understanding Professional Needs to Create Privacy-Preserving and Secure Emergent Digital Artworks
Understanding Professional Needs to Create Privacy-Preserving and Secure Emergent Digital Artworks Open
In recent years, immersive art installations featuring interactive artworks have been on the rise. These installations are an integral part of museums and art centers like selfie museums, teamLab Borderless, ARTECHOUSE, and Meow Wolf. More…
View article: A CRITICAL STUDY OF JURISDICTION IN OUTER SPACE
A CRITICAL STUDY OF JURISDICTION IN OUTER SPACE Open
It has become necessary to reevaluate the jurisdictional difficulties that are present in outer space as a result of the advent of commercial space exploration. The fundamental treaties, such as the Outer Space Treaty (OST), were primarily…
View article: ADDRESSING CROSS- BORDER DATA ACCESS FOR EFFECTIVE LAW ENFORCEMENT
ADDRESSING CROSS- BORDER DATA ACCESS FOR EFFECTIVE LAW ENFORCEMENT Open
Online data is increasingly used by law enforcement to obtain evidence for investigations. Accessing this data, especially from cloud-based services, is difficult due to jurisdictional issues and changing technology. This article examines …