[ Publications about 'Human-Centered Security' ]

Books and proceedings (1)
  1. L. Jean Camp. Trust & Risk in Internet Commerce. MIT Press, December 2000.
    Keywords: Human-Centered Security, Economics of Security. [bibtex-entry]

Articles in journals or book chapters (14)
  1. Vaibhav Garg and L. Jean Camp. Cars, Condoms, and Facebook. In Information Security, pages 280--289. Springer International Publishing, 2015.
    Keywords: Mental Models, Human-Centered Security, Privacy. [bibtex-entry]

  2. Kalpana Shankar, L. Jean Camp, Kay Connelly, and Lesa Huber. Aging, Privacy, and Home-Based Computing: Designing for Privacy. Pervasive Computing, IEEE, 11(99):46--54, 2012.
    Keywords: Human-Centered Security. [bibtex-entry]

  3. L. Jean Camp. Reconceptualizing the Role of Security User. Daedalus, 140(4):93--107, 2011.
    Keywords: Human-Centered Security, Peer Production, Crowdsourcing of Security, Economics of Security. [bibtex-entry]

  4. K. Lorenzen-Huber, L. Boutain, M., Camp, L. Jean, Shankar, K., Connelly. Privacy, Independence, and Relationships: Older Adults’ Perceptions of Home-Based Ubiquitous Technologies. In , pages 232--252. 2011.
    Keywords: Human-Centered Security. [bibtex-entry]

  5. L. Jean Camp. Mental models of privacy and security. Technology and Society Magazine, IEEE, 28(3):37--46, 2009.
    Keywords: Human-Centered Security, Mental Models. [bibtex-entry]

  6. Farzeneh Asgapour, Debin Liu, and L. Jean Camp. Mental Models of Computer Security Risks. Financial Cryptography and Data Security Lecture Notes in Computer Science, 4886:367--377, 2007.
    Note: Usable Security 07.
    Keywords: Mental Models, Human-Centered Security, Economics of Security. [bibtex-entry]

  7. L. Jean Camp. Digital Identity. IEEE Technology & Society, 23(3):34--41, 2004.
    Keywords: Human-Centered Security. [bibtex-entry]

  8. Rebecca T Mercuri and L. Jean Camp. The code of elections. Communications of the ACM, 47(10):52--57, 2004.
    Note: ACM.
    Keywords: Design for Trust, Human-Centered Security, Governance. [bibtex-entry]

  9. L. Jean Camp and Ka-Ping Yee. Human Implications of Technology. Practical Handbook of Internet Computing, ed. M. P. Singh, December 2003.
    Note: CRC Press.
    Keywords: Human-Centered Security. [bibtex-entry]

  10. L. Jean Camp. Designing for trust. Trust, Reputation, and Security: Theories and Practice, pp 203--209, 2003.
    Note: Springer.
    Keywords: Design for Trust, Privacy, Human-Centered Security. [bibtex-entry]

  11. L. Jean Camp. First principles of copyright for DRM design. IEEE Internet Computing, 7(3):59--65, 2003.
    Note: IEEE.
    Keywords: Design for Trust, Human-Centered Security. [bibtex-entry]

  12. L. Jean Camp and Marvin Sirbu. Critical issues in internet commerce. IEEE Communications Magazine, 35(5):58--62, May 1997.
    Keywords: Human-Centered Security. [bibtex-entry]

  13. L. Jean Camp. Privacy: from abstraction to applications. ACM SIGCAS Computers and Society, 24(3):8--15, September 1994.
    Keywords: Human-Centered Security. [bibtex-entry]

  14. L. Jean Camp and JD Tygar. Providing auditing while protecting privacy. The Information Society, 10(1):59--71, March 1994.
    Keywords: Human-Centered Security. [bibtex-entry]

Conference publications (5)
  1. Greg Norcie, Jim Blythe, Kelly Caine, and L. Jean Camp. Why Johnny Can’t Blow the Whistle: Identifying and Reducing Usability Issues in Anonymity Systems. In Proceedings of the Network and Distributed System Security Symposium (NDSS) Workshop on Usable Security (USEC), February 2014.
    Keywords: Human-Centered Security. [bibtex-entry]

  2. Vaibhav Garg, Kevin Benton, and L. Jean Camp. The Privacy Paradox: A Facebook Case Study. In 2014 Telecommunications Policy Research Conference (TPRC), Arlington VA, 2014.
    Keywords: Mental Models, Human-Centered Security, Social Network Privacy, Aging. [bibtex-entry]

  3. Allan Friedman and L. Jean Camp. Making Security Manifest Security and Autonomy for End Users. In , 2003. TPRC.
    Keywords: Mental Models, Human-Centered Security, Economics of Security. [bibtex-entry]

  4. L. Jean Camp. DRM: doesn't really mean digital copyright management. In Proceedings of the 9th ACM conference on Computer and Communications Security, pages 78--87, 2002. ACM.
    Keywords: Design for Trust, Privacy, Human-Centered Security. [bibtex-entry]

  5. L. Jean Camp, Helen Nissenbaum, and Cathleen McGrath. Trust: A collision of paradigms. In International Conference on Financial Cryptography, pages 91--105, October 2001. Springer Berlin Heidelberg.
    Keywords: Design for Trust, Human-Centered Security, PKI. [bibtex-entry]


BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Thu Nov 26 01:00:07 2020
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House