[ Publications about 'Human-Centered Security' ]

Articles in journals or book chapters (11)
  1. Vaibhav Garg and L. Jean Camp. Cars, Condoms, and Facebook. In Information Security, pages 280--289. Springer International Publishing, 2015.
    Keywords: Mental Models, Human-Centered Security, Privacy. [bibtex-entry]

  2. Kalpana Shankar, L. Jean Camp, Kay Connelly, and Lesa Huber. Aging, Privacy, and Home-Based Computing: Designing for Privacy. Pervasive Computing, IEEE, 11(99):46--54, 2012.
    Keywords: Human-Centered Security. [bibtex-entry]

  3. L. Jean Camp. Reconceptualizing the Role of Security User. Daedalus, 140(4):93--107, 2011.
    Keywords: Human-Centered Security, Peer Production, Crowdsourcing of Security, Economics of Information Security. [bibtex-entry]

  4. K. Lorenzen-Huber, L. Boutain, M., Camp, L. Jean, Shankar, K., Connelly. Privacy, Independence, and Relationships: Older Adults’ Perceptions of Home-Based Ubiquitous Technologies. In , pages 232--252. 2011.
    Keywords: Human-Centered Security. [bibtex-entry]

  5. Farzeneh Asgapour, Debin Liu, and L. Jean Camp. Mental Models of Computer Security Risks. Financial Cryptography and Data Security Lecture Notes in Computer Science, 4886:367--377, 2007.
    Note: Usable Security 07.
    Keywords: Mental Models, Human-Centered Security, Economics of Information Security. [bibtex-entry]

  6. Kay Connelly and L. Jean Camp. Beyond Consent: Privacy in Ubiquitous Computing (Ubicomp). In Digital Privacy: Theory, Technologies and Practices eds, pages 332--348. Auerbach Publications, 2007.
    Keywords: Human-Centered Security. [bibtex-entry]

  7. L. Jean Camp. Digital Identity. IEEE Technology & Society, 23(3):34--41, 2004.
    Keywords: Human-Centered Security. [bibtex-entry]

  8. L. Jean Camp and Ka-Ping Yee. Human Implications of Technology. Practical Handbook of Internet Computing, ed. M. P. Singh, December 2003.
    Note: CRC Press.
    Keywords: Human-Centered Security. [bibtex-entry]

  9. L. Jean Camp and Marvin Sirbu. Critical issues in internet commerce. IEEE Communications Magazine, 35(5):58--62, May 1997.
    Keywords: Human-Centered Security. [bibtex-entry]

  10. L. Jean Camp. Privacy: from abstraction to applications. ACM SIGCAS Computers and Society, 24(3):8--15, September 1994.
    Keywords: Human-Centered Security. [bibtex-entry]

  11. L. Jean Camp and JD Tygar. Providing auditing while protecting privacy. The Information Society, 10(1):59--71, March 1994.
    Keywords: Human-Centered Security. [bibtex-entry]

Conference publications (5)
  1. L. Jean Camp, Jacob Abbott, and Siyu Chen. CPasswords: Leveraging Episodic Memory and Human-Centered Design for Better Authentication. In 2016 49th Hawaii International Conference on System Sciences (HICSS), pages 3656--3665, January 2016. IEEE.
    Keywords: Human-Centered Security, Passwords, Information Security, Usability, User Study, Authentication. [bibtex-entry]

  2. Greg Norcie, Jim Blythe, Kelly Caine, and L. Jean Camp. Why Johnny Can’t Blow the Whistle: Identifying and Reducing Usability Issues in Anonymity Systems. In Proceedings of the Network and Distributed System Security Symposium (NDSS) Workshop on Usable Security (USEC), February 2014.
    Keywords: Human-Centered Security. [bibtex-entry]

  3. L. Jean Camp, Cathleen McGrath, and Alla Genkina. Security and Morality: A Tale of User Deceit. In , May 2006. Models of Trust for the Web MTW'06.
    Keywords: Human-Centered Security, Privacy. [bibtex-entry]

  4. Allan Friedman and L. Jean Camp. Making Security Manifest Security and Autonomy for End Users. In , 2003. TPRC.
    Keywords: Mental Models, Human-Centered Security, Economics of Information Security. [bibtex-entry]

  5. L. Jean Camp, Helen Nissenbaum, and Cathleen McGrath. Trust: A collision of paradigms. In International Conference on Financial Cryptography, pages 91--105, October 2001. Springer Berlin Heidelberg.
    Keywords: Design for Trust, Human-Centered Security. [bibtex-entry]

Posters and Presentations (1)
  1. Jacob Abbott, Violeta Moreno, and L. Jean Camp. Password Differences based on Language and Testing of Memory Recall. Annual Computer Security Applications Conference, (New Oleans, LA), December 2014.
    Keywords: Human-Centered Security. [bibtex-entry]



This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

Last modified: Wed Sep 23 01:00:09 2020
Author: teamhats.

This document was translated from BibTEX by bibtex2html and is customized by IU IoT House