[ Articles in journals or book chapters ]

2019 (1)
  1. L. Jean Camp and Sanchari Das. Studies of 2FA, Why Johnny Can’t Use 2FA and How We Can Change That?. In . Springer US, March 2019.
    Keywords: 2FA, authentication, human factors, usability. [bibtex-entry]


2018 (4)
  1. Clint McElroy, Pablo Moriano, and L. Jean Camp. Poster: On Predicting BGP Anomalous Incidents: A Bayesian Approach. February 2018. [bibtex-entry]


  2. Jayati Dev, Sanchari Das, and Kaushik Srinivasan. Modularity is the Key: A New Approach to Social Media Privacy Policies. 2018. [bibtex-entry]


  3. Pablo Moriano, Jared Pendleton, Steven Rich, and L. Jean Camp. Stopping the Insider at the Gates: Protecting Organizational Assets Through Graph Mining. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 9(1):4--29, 2018. [bibtex-entry]


  4. Paul van Schaik, Jurjen Jansen, Joseph Onibokun, L. Jean Camp, and Petko Kusev. Security and privacy in online social networking: Risk perceptions and precautionary behaviour. Computers in Human Behavior, 78:283--297, 2018.
    Note: Pergamon. [bibtex-entry]


2017 (6)
  1. Sanchari Das, Gianpaolo Russo, Andrew C Dingman, Jayati Dev, Olivia Kenny, and L Jean Camp. A Qualitative Study on Usability and Acceptability of Yubico Security Key. 2017.
    Keywords: 2FA. [bibtex-entry]


  2. Sanchari Das, Gianpaolo Russo, Andrew C Dingman, Jayati Dev, Olivia Kenny, and L Jean Camp. A Qualitative Study on Usability and Acceptability of Yubico Security Key. 2017. [bibtex-entry]


  3. Shakthidhar Gopavaram, Omkar Bhide, and L. Jean Camp. Can You Hear Me Now?: A Technical Report on Combining Audio with Privacy Permissions. 2017. [bibtex-entry]


  4. Lesa Huber and L. Jean Camp. User-Driven Design in Smart Homes: Ethical Aspects. Handbook of Smart Homes, Health Care and Well-Being, pp 93--103, 2017.
    Note: Springer International Publishing. [bibtex-entry]


  5. Pablo Moriano, Soumya Achar, and L. Jean Camp. Incompetents, criminals, or spies: Macroeconomic analysis of routing anomalies. Computers & Security, 70:319--334, 2017.
    Note: Elsevier Advanced Technology. [bibtex-entry]


  6. Prashanth Rajivan, Pablo Moriano, Timothy Kelley, and L. Jean Camp. Factors in an end user security expertise instrument. Information & Computer Security, 25(2):190--205, 2017.
    Note: Emerald Publishing Limited. [bibtex-entry]


2016 (7)
  1. Kevin Benton and L. Jean Camp. Preventing Data Exfiltration via Political and Geographic Routing Policies. Available at SSRN 2753133, October 2016.
    Keywords: E-Crime, Economics of Information Security. [bibtex-entry]


  2. Zheng Dong, Kevin Kane, and L. Jean Camp. Detection of Rogue Certificates from Trusted Certificate Authorities Using Deep Neural Networks. ACM Transactions on Privacy and Security (TOPS), 19(2):5, September 2016.
    Keywords: Network Engineering. [bibtex-entry]


  3. Zheng Dong, Kevin Kane, Siyu Chen, and L. Jean Camp. The New Wildcats: High-Risk Banking From Worst-Case Certificate Practices Online. April 2016.
    Keywords: E-Crime, Economics of Information Security. [bibtex-entry]


  4. Kevin Benton, L. Jean Camp, Tim Kelley, and Martin Swany. Filtering Source-Spoofed IP Traffic Using Feasible Path Reverse Path Forwarding with SDN. International Journal of Computer and Communication Engineering, 5(6):441, 2016. [bibtex-entry]


  5. L JEAN CAMP and LESA LORENZEN HUBER. PRIVACY IMPLICATIONS OF AWARE, ACTIVE, AND ADAPTIVE TECHNOLOGIES. Gerontechnology: Research, Practice, and Principles in the Field of Technology and Aging, 2016.
    Note: Springer Publishing Company. [bibtex-entry]


  6. Pablo Moriano, Soumya Achar, and L. Jean Camp. Macroeconomic Analysis of Routing Anomalies. Available at SSRN 2755699, 2016.
    Keywords: E-Crime, Network Engineering, Economics of Information Security. [bibtex-entry]


  7. Prashanth Rajivan and L. Jean Camp. Too Much Too Late: Influence of risk communication on Android App installations--UNDER REVIEW. 2016. [bibtex-entry]


2015 (6)
  1. Greg Norcie and L. Jean Camp. The Price Of Privacy: An Examination of the Economic Costs of Abstention from Social Networks. 2015 Amsterdam Privacy Conference (APC 2015), October 2015.
    Keywords: Privacy, Peer Production, Crowdsourcing of Security, Internet Governance. [bibtex-entry]


  2. Jacob Abbott and Violeta Moreno Garcia. Password differences based on language and testing of memory recall. NNGT International Journal of Information Security, 2:1--6, 2015.
    Keywords: Passwords, Information Security, Usability, User Study, Authentication. [bibtex-entry]


  3. L. Jean Camp. Respecting people and respecting privacy. Communications of the ACM, 58(7):27--28, 2015.
    Note: ACM. [bibtex-entry]


  4. Vaibhav Garg and L. Jean Camp. Cars, Condoms, and Facebook. In Information Security, pages 280--289. Springer International Publishing, 2015.
    Keywords: Mental Models, Human-Centered Security, Privacy. [bibtex-entry]


  5. V Garg and L. Jean Camp. Risk Characteristics, Mental Models, and Perception of Security Risks. Academy of Science and Engineering, USA, 2015. [bibtex-entry]


  6. Vaibhav Garg and L. Jean Camp. Why cybercrime?. ACM SIGCAS Computers and Society, 45(2):20--28, 2015.
    Keywords: E-Crime. [bibtex-entry]


2014 (5)
  1. Terry Davis, Jon M Peha, Eric Burger, L. Jean Camp, and Dan Lubar. Risking it All: Unlocking the Backdoor to the Nation's Cybersecurity. Available at SSRN 2468604, 2014. [bibtex-entry]


  2. Vaibhav Garg, L. Jean Camp, Lesa Lorenzen-Huber, Kalpana Shankar, and Kay Connelly. Privacy concerns in assisted living technologies. annals of telecommunications-annales des t?l?communications, 69(1-2):75--88, 2014.
    Keywords: Aging. [bibtex-entry]


  3. Hilda Hadan. On the Application of Two-Dimensional Code in Television Production and Broadcasting. International Broadband Network, 2014.
    Keywords: Two-Dimensional Code, Television Production. [bibtex-entry]


  4. Chris Hall, Dongting Yu, Zhi-li Zhang, Jonathan Stout, Andrew Odlyzko, Andrew W Moore, L. Jean Camp, Kevin Benton, and Ross Anderson. Collaborating with the enemy on network management. In Security Protocols XXII, pages 154--162. Springer International Publishing, 2014.
    Keywords: Network Engineering. [bibtex-entry]


  5. Martina Angela Sasse, Charles C Palmer, Markus Jakobsson, Sunny Consolvo, Rick Wash, and L. Jean Camp. Helping you protect you. IEEE Security & Privacy, 12(1):39--42, 2014. [bibtex-entry]


2013 (7)
  1. Zheng Dong, Apu Kapadia, and L. Jean Camp. Pinning & binning: Real time classification of certificates. December 2013.
    Keywords: Phishing, Network Engineering. [bibtex-entry]


  2. Vaibhav Garg, Thomas Koster, and L. Jean Camp. Cross-country analysis of spambots. EURASIP Journal on Information Security, 2013(1):3, October 2013.
    Keywords: E-Crime, Economics of Information Security. [bibtex-entry]


  3. Vaibhav Garg and L. Jean Camp. Perceptions of Computing Risks. July 2013. [bibtex-entry]


  4. Warigia Bowman and L. Jean Camp. Protecting the Internet from Dictators Technical and Policy Solutions to Ensure Online Freedoms.. Innovation Journal, 18(1), 2013.
    Keywords: Internet Governance. [bibtex-entry]


  5. Vaibhav Garg, Thomas Koster, and L. Jean Camp. Spam is a vector for cybercrime and commonly legally prohibited. Why do certain national jurisdictions produce a higher percentage of spam than others despite its prohibition? Why do some countries have a higher percentage of systems acting as spambots compared to other countries? We begin to answer there questions by conducting a cross-country empirical analysis of economic factors that correlate.... EURASIP Journal on Information Security, 2013(1):1--13, 2013. [bibtex-entry]


  6. Lesa Lorenzen Huber, Kalpana Shankar, Kelly Caine, Kay Connelly, L. Jean Camp, Beth Ann Walker, and Lisa Borrero. How In-Home Technologies Mediate Caregiving Relationships in Later Life. International Journal of Human-Computer Interaction, 29(7):441--455, 2013.
    Keywords: Aging. [bibtex-entry]


  7. Timothy Kelley and L. Jean Camp. Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections. In The Economics of Information Security and Privacy, pages 157--180. Springer Berlin Heidelberg, 2013.
    Keywords: E-Crime, Network Engineering, Privacy, Economics of Information Security. [bibtex-entry]


2012 (17)
  1. Alessandro Armando, Hilarie Orman, Terry Benzel, L. Jean Camp, Bruno Crispo, Grit Denker, Eduard Hovy, Alefiya Hussain, Daniela Oliveira, and Pierangela Samarati. WSCS 2012. 2012. [bibtex-entry]


  2. Jim Blyth, Sven Dietrich, and L. Jean Camp. Proceedings of the 16th international conference on Financial Cryptography and Data Security. Springer-Verlag, 2012. [bibtex-entry]


  3. L. Jean Camp and M Eric Johnson. Identity Theft. The Economics of Financial and Medical Identity Theft, pp 17--30, 2012.
    Note: Springer US. [bibtex-entry]


  4. L. Jean Camp and M Eric Johnson. Security and Privacy as Market Failures. The Economics of Financial and Medical Identity Theft, pp 53--60, 2012.
    Note: Springer US. [bibtex-entry]


  5. L. Jean Camp and M Eric Johnson. Identity in Economics, and in Context. The Economics of Financial and Medical Identity Theft, pp 1--4, 2012.
    Note: Springer US. [bibtex-entry]


  6. L. Jean Camp and M Eric Johnson. Identity Scenarios. The Economics of Financial and Medical Identity Theft, pp 127--145, 2012.
    Note: Springer US. [bibtex-entry]


  7. L. Jean Camp and M Eric Johnson. Defeating the Greatest Masquerade. The Economics of Financial and Medical Identity Theft, pp 31--39, 2012.
    Note: Springer US. [bibtex-entry]


  8. Vaibhav Garg and L. Jean Camp. Gandhigiri in cyberspace: a novel approach to information ethics. ACM SIGCAS Computers and Society, 42(1):9--20, 2012.
    Keywords: Internet Governance. [bibtex-entry]


  9. Vaibhav Garg and L. Jean Camp. End User Perception of Online Risk Under Uncertainty. Hawaii International Conference On System Sciences, (Manoa, HI), pp 13--16, January 2012.
    Keywords: Mental Models. [bibtex-entry]


  10. V Garg, L Huber, L. Jean Camp, and K Connelly. Risk communication design for older adults. Gerontechnology, 11(2):166, 2012.
    Keywords: Mental Models, Aging. [bibtex-entry]


  11. Vaibhav Garg, Chris Kanich, and L. Jean Camp. Analysis of ecrime in Crowd-sourced Labor Markets: Mechanical Turk vs. Freelancer. at WEIS, 2012.
    Keywords: E-Crime. [bibtex-entry]


  12. Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Melanie Volkamer, and Mike Reiter. Proceedings of the 5th international conference on Trust and Trustworthy Computing. Springer-Verlag, 2012. [bibtex-entry]


  13. Debin Liu, Ninghui Li, XiaoFeng Wang, and L. Jean Camp. Beyond Risk-Based Access Control: Towards Incentive-Based Access Control. Financial Cryptography and Data Security, pp 102--112, 2012.
    Note: Springer Berlin/Heidelberg. [bibtex-entry]


  14. Greg Norcie, Kelly Caine, and L. Jean Camp. Torpid: Delay and Difficult in the Tor Bundle. 2012. [bibtex-entry]


  15. Andrew S Patrick and L. Jean Camp. Harm Mitigation from the Release of Personal Identity Information. Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards, pp 309-330, 2012.
    Note: Business Science Reference.
    Keywords: Privacy, Economics of Information Security. [bibtex-entry]


  16. Kalpana Shankar, L. Jean Camp, Kay Connelly, and Lesa Huber. Aging, Privacy, and Home-Based Computing: Designing for Privacy. Pervasive Computing, IEEE, 11(99):46--54, 2012.
    Keywords: Human-Centered Security. [bibtex-entry]


  17. K Shankar, L Huber, L. Jean Camp, K Caine, and K Connelly. Finding the older user in home-based computing studies. Gerontechnology, 11(2):305, 2012.
    Keywords: Aging. [bibtex-entry]


2011 (12)
  1. Vaibhav Garg and L. Jean Camp. Heuristics and Biases: Implications for Security Design. IEEE Technology & Society, March 2011.
    Note: IEEE.
    Keywords: Mental Models. [bibtex-entry]


  2. L. Jean Camp and Kalpana Shankar. CONSTRUCTING THE OLDER USER IN HOME-BASED UBIQUITOUS COMPUTING. The Social Impact of Social Computing, pp 110, 2011.
    Note: Sheffield Hallam University. [bibtex-entry]


  3. L. Jean Camp. Reconceptualizing the Role of Security User. Daedalus, 140(4):93--107, 2011.
    Keywords: Human-Centered Security, Peer Production, Crowdsourcing of Security, Economics of Information Security. [bibtex-entry]


  4. L. Jean Camp. Computer security and, versus, or security informatics: keynote address. Journal of Computing Sciences in Colleges, 26(4):113--114, 2011. [bibtex-entry]


  5. Zheng Dong and L. Jean Camp. The decreasing marginal value of evaluation network size. ACM SIGCAS Computers and Society, 41(1):23--37, 2011.
    Keywords: Mental Models, Economics of Information Security. [bibtex-entry]


  6. John F Duncan, L. Jean Camp, and William R Hazlewood. The Portal Monitor: A Privacy-Aware Event-Driven. Smart Healthcare Applications and Services: Developments and Practices, pp 219, 2011.
    Note: IGI Global. [bibtex-entry]


  7. Vaibhav Garg, L. Jean Camp, LM Lorenzen-Huber, and Katherine Connelly. Designing risk communication for older adults. Proceedings of Ethicomp, Sheffield, UK, 2011. [bibtex-entry]


  8. Vaibhav Garg, Indiana Univeristy, L. Jean Camp, Lesa Mae Lorenzen-Huber, Kalpana Shankar, Katherine Connelly, and Kelly Caine. Privacy Framework for Older Adults. 2011. [bibtex-entry]


  9. Debin Liu, Ninghui Li, XiaoFeng Wang, and L. Jean Camp. Security Risk Management using Incentives. IEEE Security and Privacy, 2011.
    Note: IEEE Computer Society.
    Keywords: Economics of Information Security. [bibtex-entry]


  10. Lesa Lorenzen-Huber, Mary Boutain, L. Jean Camp, Kalpana Shankar, and Kay H Connelly. Privacy, Technology, and Aging: A Proposed Framework. Ageing International, 36(2):232--252, 2011. [bibtex-entry]


  11. K. Lorenzen-Huber, L. Boutain, M., Camp, L. Jean, Shankar, K., Connelly. Privacy, Independence, and Relationships: Older Adults’ Perceptions of Home-Based Ubiquitous Technologies. In , pages 232--252. 2011.
    Keywords: Human-Centered Security. [bibtex-entry]


  12. Tonya Thompson and L. Jean Camp. Privacy Awareness for the Design of Pervasive Home-Based Technology for Elders. 2011. [bibtex-entry]


2010 (3)
  1. L. Jean Camp. Identity management's misaligned incentives. IEEE Security & Privacy, 8(6):90--94, 2010.
    Note: IEEE. [bibtex-entry]


  2. Nathaniel Husted, Vaibhav Garg, and L. Jean Camp. Organized Digital Crime: The Smuggling Theory Approach (A Short Paper). Available at SSRN 1713372, 2010. [bibtex-entry]


  3. Debin Liu, L. Jean Camp, XiaoFeng Wang, and Lusha Wang. Using Budget-Based Access Control to Manage Operational Risks Caused by Insiders. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 1(1):29--45, 2010.
    Keywords: Economics of Information Security. [bibtex-entry]


2009 (5)
  1. Debin Liu, XiaoFeng Wang, and L. Jean Camp. Mitigating inadvertent insider threats with incentives. Financial Cryptography and Data Security, pp 1--16, February 2009.
    Keywords: E-Crime. [bibtex-entry]


  2. Farzaneh Asgharpour, Alex Tsow, Preeti Hariharan, and L. Jean Camp. A Usability Study on the Net Trust Anti-Fraud Toolbar. 2009. [bibtex-entry]


  3. L. Jean Camp. Mental models of privacy and security. Technology and Society Magazine, IEEE, 28(3):37--46, 2009. [bibtex-entry]


  4. L. Jean Camp. Power and Security in the Information Age. Routledge, 2009. [bibtex-entry]


  5. Camilo Viecco and L. Jean Camp. A risk based approach to limit the effects of covert channels for internet sensor data aggregators for sensor privacy. Trust Management III, pp 234--251, 2009.
    Note: Springer. [bibtex-entry]


2008 (6)
  1. Views from Embeds, Hillary Elmore, L. Jean Camp, and Brandon Stephens. Diffusion and Adoption of IPv6 in the ARIN Region. September 2008.
    Keywords: Economics of Information Security. [bibtex-entry]


  2. L. Jean Camp and Kay Connelly. Beyond consent: privacy in ubiquitous computing (Ubicomp). Digital privacy: Theory, technologies, and practices, pp 327--343, 2008. [bibtex-entry]


  3. L. Jean Camp. A Review of Security and Human Behaviors. Available at SSRN 1156180, 2008. [bibtex-entry]


  4. L. Jean Camp and Kay Connelly. Beyond consent: privacy in ubiquitous computing (Ubicomp). Digital privacy: Theory, technologies, and practices, pp 327--343, 2008. [bibtex-entry]


  5. Debin Liu, XiaoFeng Wang, and L. Jean Camp. Game-theoretic modeling and analysis of insider threats. International Journal of Critical Infrastructure Protection, 1:75--80, 2008.
    Note: Elsevier.
    Keywords: Economics of Information Security. [bibtex-entry]


  6. Camilo Viecco and L. Jean Camp. a life or death infosec subversion. IEEE Security & Privacy, 6(5):74--76, 2008.
    Note: IEEE. [bibtex-entry]


2007 (9)
  1. Farzeneh Asgapour, Debin Liu, and L. Jean Camp. Mental Models of Computer Security Risks. Financial Cryptography and Data Security Lecture Notes in Computer Science, 4886:367--377, 2007.
    Note: Usable Security 07.
    Keywords: Mental Models, Human-Centered Security, Economics of Information Security. [bibtex-entry]


  2. Farzaneh Asgharpour, Debin Liu, and L. Jean Camp. Mental models of security risks. Financial Cryptography and Data Security, pp 367--377, 2007.
    Note: Springer. [bibtex-entry]


  3. L. Jean Camp, Farzaneh Asgharpour, Debin Liu, and IN Bloomington. Experimental evaluations of expert and non-expert computer users’ mental models of security risks. Proceedings of WEIS 2007, 2007. [bibtex-entry]


  4. L. Jean Camp. Reliable, Usable Signaling to Defeat Masquerade Attacks. ISJLP, 3:211, 2007.
    Note: HeinOnline.
    Keywords: Economics of Information Security. [bibtex-entry]


  5. L. Jean Camp. Security and Usability [Guest Editor's Introduction]. Technology and Society Magazine, IEEE, 26(1):3--24, 2007. [bibtex-entry]


  6. Kay Connelly and L. Jean Camp. Beyond Consent: Privacy in Ubiquitous Computing (Ubicomp). In Digital Privacy: Theory, Technologies and Practices eds, pages 332--348. Auerbach Publications, 2007.
    Keywords: Human-Centered Security. [bibtex-entry]


  7. Alla Genkina and L. Jean Camp. Social networks. Phishing and countermeasures: Understanding the increasing problem of electronic identity theft, M. Jakobsson and S. Myers, Eds. Hoboken: John Wiley & Sons, pp 523--550, 2007.
    Note: Wiley Online Library. [bibtex-entry]


  8. Alex Tsow, Camilo Viecco, and L. Jean Camp. Privacy-aware architecture for sharing web histories. IBM Systems Journal, 3:5--13, 2007.
    Keywords: Economics of Information Security. [bibtex-entry]


  9. Sabrina De Capitani di Vimercati, Stefanos Gritzalis, Costas Lambrinoudakis, Alessandro Acquisti, L. Jean Camp, and Kay Connelly. Beyond Consent: Systematic Design for Privacy in Ubicomp. In Digital Privacy: Theory, Technologies, and Practices, pages 327--343. Auerbach Publications, 2007.
    Keywords: Aging. [bibtex-entry]


2006 (9)
  1. Mental Models of Privacy and Security. IEEE Technology & Society, Vol 28 (3) 37-46, August 2006.
    Keywords: Mental Models, Net Trust. [bibtex-entry]


  2. L. Jean Camp and Alla Genkina. Social Networks. In Phishing and Countermeasures, pages 523--550. Wiley, 2006.
    Keywords: Peer Production, Crowdsourcing of Security, Net Trust. [bibtex-entry]


  3. L. Jean Camp and others. When Proof of Work Works. 2006. [bibtex-entry]


  4. L. Jean Camp, Kalpana Shankar, and Kay Connelly. Systematic Design for Privacy in Ubicomp. Available at SSRN 889444, 2006. [bibtex-entry]


  5. L. Jean Camp. Varieties of software and their implications for effective democratic government. Proceedings of the British Academy, Vol. 135, pp. 183-185, 2006, 2006.
    Keywords: Internet Governance. [bibtex-entry]


  6. L. Jean Camp. Reliable Usable Signals to Prevent Masquerade Attacks. Available at SSRN 894973, 2006. [bibtex-entry]


  7. Alla Genkina, L. Jean Camp, and IN Bloomington. Countermeasures: Social Networks. 2006. [bibtex-entry]


  8. Suzanne Lien, Timothy Kelley, and L. Jean Camp. Expert and Non-expert Viewing Patterns When Seeking Security Cues. 2006. [bibtex-entry]


  9. Debin Liu and L. Jean Camp. Abstract and overview proof of work can work. 2006. [bibtex-entry]


2005 (4)
  1. L. Jean Camp and Allan Friedman. Peer Production of Privacy and Security Information. Telecommunications Policy Research Conference, June 2005.
    Keywords: Peer Production, Crowdsourcing of Security, Economics of Information Security. [bibtex-entry]


  2. L. Jean Camp. The state of economics of information security. ISJLP, 2:189, 2005. [bibtex-entry]


  3. Allan Friedman and L. Jean Camp. Peer-to-peer security. The Handbook of Information Security. J. Wiley&Sons, 2005.
    Note: Citeseer. [bibtex-entry]


  4. Alla Genkina and L. Jean Camp. Re-embedding existing social networks into online experiences to aid in trust assessment. Available at SSRN 707139, 2005. [bibtex-entry]


2004 (8)
  1. L. Jean Camp and Allan Friedman. Security in Peer to Peer Systems. In The Handbook of Information Security. John Wiley & Sons, 2004.
    Keywords: Peer Production, Crowdsourcing of Security. [bibtex-entry]


  2. L. Jean Camp. Identity in digital government. Available at SSRN 615187, 2004. [bibtex-entry]


  3. L. Jean Camp, Fu-Shoun Mao, and Mridul Chowdhury. Thailand at the crossroads. International Journal of Technology, Policy and Management, 4(2):116--135, 2004.
    Keywords: Internet Governance. [bibtex-entry]


  4. L. Jean Camp and Catherine Wolfram. Pricing security. In Economics of Information Security, pages 17--34. Springer US, 2004.
    Keywords: Economics of Information Security. [bibtex-entry]


  5. L. Jean Camp. Digital Identity. IEEE Technology & Society, 23(3):34--41, 2004.
    Keywords: Human-Centered Security. [bibtex-entry]


  6. L. JeanL Camp. Digital identity. IEEE Technology and Society Magazine, 23(3):34--41, 2004.
    Note: IEEE. [bibtex-entry]


  7. Rebecca T Mercuri and L. Jean Camp. The code of elections. Communications of the ACM, 47(10):52--57, 2004.
    Note: ACM. [bibtex-entry]


  8. Charles Vincent and L. Jean Camp. Looking to the Internet for models of governance. Ethics and Information Technology, 6(3):161--173, 2004.
    Keywords: Internet Governance. [bibtex-entry]


2003 (6)
  1. L. Jean Camp and Ka-Ping Yee. Human Implications of Technology. Practical Handbook of Internet Computing, ed. M. P. Singh, December 2003.
    Note: CRC Press.
    Keywords: Human-Centered Security. [bibtex-entry]


  2. L. Jean Camp. Code, coding and coded perspectives. Journal of Information, Communication and Ethics in Society, 1(1):49--60, 2003.
    Keywords: Internet Governance. [bibtex-entry]


  3. L. Jean Camp and Carlos A Osorio. Privacy-enhancing technologies for internet commerce. Trust in the Network Economy, pp 317--331, 2003.
    Note: Springer.
    Keywords: Privacy. [bibtex-entry]


  4. L. Jean Camp. First principles of copyright for DRM design. IEEE Internet Computing, 7(3):59--65, 2003.
    Note: IEEE. [bibtex-entry]


  5. L. Jean Camp. Designing for trust. Trust, Reputation, and Security: Theories and Practice, pp 203--209, 2003.
    Note: Springer.
    Keywords: SDN. [bibtex-entry]


  6. L. Jean Camp. Peer-to-Peer Systems. The Internet Encyclopedia, 2003.
    Note: Wiley Online Library.
    Keywords: Design for Trust. [bibtex-entry]


2002 (4)
  1. Serena Chan and L. Jean Camp. Towards Coherent Regulation of Law Enforcement Surveillance in the Network Society. IEEE Technology and Society Magazine, 21(2):22--30, 2002.
    Keywords: Internet Governance. [bibtex-entry]


  2. Serena Chan and L. Jean Camp. Law enforcement surveillance in the network society. IEEE Technology and Society Magazine, 21(2):22--30, 2002.
    Note: IEEE. [bibtex-entry]


  3. Carlos A Osorio and L. Jean Camp. Dimensions for the analysis of conflicts between business and technological models in privacy-enhancing solutions for electronic commerce. Inet 2002, 2002. [bibtex-entry]


  4. Serena Syme and L. Jean Camp. The governance of code: Open land vs. UCITA land. ACM SIGCAS Computers and Society, 32(3):2, 2002. [bibtex-entry]


2001 (7)
  1. L. Jean Camp. The Shape of the Network. August 2001.
    Keywords: Design for Trust, Internet Governance, Gender Online. [bibtex-entry]


  2. L. Jean Camp. An atomicity-generating protocol for anonymous currencies. Software Engineering, IEEE Transactions on, 27(3):272--278, March 2001.
    Keywords: Network Engineering, Privacy. [bibtex-entry]


  3. L. Jean Camp and Brian L Anderson. Deregulating the local loop: the telecommunications regulation path less chosen as taken by Bangladesh. International Journal of Technology, Policy and Management, 1(1):100--114, 2001.
    Keywords: Internet Governance. [bibtex-entry]


  4. L. Jean Camp and K Lewis. Code as speech: A discussion of Bernstein v. USDOJ, Karn v. USDOS, and Junger v. Daley in light of the US Supreme Court's recent shift to Federalism. Ethics and Information Technology, 3(1):21--33, 2001. [bibtex-entry]


  5. L Jean CAMP. Trust & risk in internet commerce (paperback). Recherche, 67:02, 2001. [bibtex-entry]


  6. L. Jean Camp and Serena Syme. Code as Embedded Speech, Machine, and Service. Journal of Information, Law and Technology, 2001(2), 2001.
    Keywords: Internet Governance. [bibtex-entry]


  7. L. Jean Camp and Serena Syme. Code as Governance, The Governance of Code. John F. Kennedy School of Government Faculty Research Working Paper Series, pp 01--014, 2001.
    Keywords: Internet Governance. [bibtex-entry]


2000 (5)
  1. L. Jean Camp and YT Chien. The internet as public space: concepts, issues, and implications in public policy. ACM SIGCAS Computers and Society, 30(3):13--19, 2000. [bibtex-entry]


  2. L. Jean Camp. The world in 2010: many new entrants. info, 2(2):167--185, 2000.
    Note: MCB UP Ltd. [bibtex-entry]


  3. L. Jean Camp and Rose P Tsang. Universal service in a ubiquitous digital network. Ethics and Information Technology, 2(4):211--221, 2000.
    Keywords: Network Engineering. [bibtex-entry]


  4. L. Jean Camp. The Post-Convergence Consumer. In Creative Destruction, pages 213--228. MIT Press, 2000.
    Keywords: Internet Governance. [bibtex-entry]


  5. Alan McAdams, L. Jean Camp, and Shastri Divakaruni. The evolution of US telecommunications infrastructure. info, 2(2):107--110, 2000.
    Note: MCB UP Ltd. [bibtex-entry]


1999 (3)
  1. L. Jean Camp. Community Considered. In democracy.com? Governance in a Networked World. Hollis Publishin, 1999.
    Keywords: Internet Governance. [bibtex-entry]


  2. L. Jean Camp. Web security and privacy: An American perspective. The Information Society, 15(4):249--256, 1999.
    Note: Taylor & Francis. [bibtex-entry]


  3. L. Jean Camp and Brian L Anderson. Grameen phone: empowering the poor through connectivity. Information Impacts Magazine, pp 13--27, 1999. [bibtex-entry]


1998 (1)
  1. L. Jean Camp and JFK Street Cambridge. Democratic Implications of Internet Privacy. Design for values: ethnical, societal & policy dimensions of information technology, February 28-March 1, 1998, pp 7, 1998.
    Note: DIMACS.
    Keywords: Internet Governance. [bibtex-entry]


1997 (1)
  1. L. Jean Camp and Marvin Sirbu. Critical issues in internet commerce. IEEE Communications Magazine, 35(5):58--62, May 1997.
    Keywords: Human-Centered Security. [bibtex-entry]


1996 (1)
  1. L. Jean Camp. We are geeks, and we are not guys: The systers mailing list. Wired women: Gender and new realities in cyberspace, pp 114--125, 1996.
    Keywords: Gender Online. [bibtex-entry]


1994 (4)
  1. L. Jean Camp. Privacy: from abstraction to applications. ACM SIGCAS Computers and Society, 24(3):8--15, September 1994.
    Keywords: Human-Centered Security. [bibtex-entry]


  2. L. Jean Camp and JD Tygar. Providing auditing while protecting privacy. The Information Society, 10(1):59--71, March 1994.
    Keywords: Human-Centered Security. [bibtex-entry]


  3. L. Jean Camp. Cryptography policy needs another look. IEEE Spectrum, 31(6):15--16, 1994.
    Note: IEEE Press. [bibtex-entry]


  4. L. Jean Camp, Rohini Sharma, and Michael R Feldman. Guided-wave and free-space optical interconnects for parallel-processing systems: a comparison. Applied optics, 33(26):6168--6180, 1994.
    Note: Optical Society of America. [bibtex-entry]



BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Tue Apr 23 01:00:07 2019
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House