[ Publications of year 2003 ]

Articles in journals or book chapters (6)
  1. L. Jean Camp and Ka-Ping Yee. Human Implications of Technology. Practical Handbook of Internet Computing, ed. M. P. Singh, December 2003.
    Note: CRC Press.
    Keywords: Human-Centered Security.
    @Article{ camphuman,
    title = {Human Implications of Technology},
    url = {http://www.ljean.com/files/CampYeeHandbook.pdf},
    journal = {Practical Handbook of Internet Computing, ed. M. P. Singh},
    note = {CRC Press},
    keywords = "Human-Centered Security",
    author = {Camp, L. Jean and Yee, Ka-Ping},
    month = {December},
    year = {2003} }

  2. L. Jean Camp. Peer-to-Peer Systems. The Internet Encyclopedia, 2003.
    Note: Wiley Online Library.
    Keywords: Design for Trust.
    @Article{ camp2003peer,
    title = {Peer-to-Peer Systems},
    url = {http://www.ljean.com/files/P2P.pdf},
    author = {Camp, L. Jean},
    journal = {The Internet Encyclopedia},
    year = {2003},
    keywords = "Design for Trust",
    note = {Wiley Online Library} }

  3. L. Jean Camp. Code, coding and coded perspectives. Journal of Information, Communication and Ethics in Society, 1(1):49--60, 2003.
    Keywords: Internet Governance.
    @Article{ camp2003code,
    title = {Code, coding and coded perspectives},
    url = {http://www.ljean.com/files/aoir/aoir.html},
    author = {Camp, L. Jean},
    journal = {Journal of Information, Communication and Ethics in Society},
    volume = {1},
    number = {1},
    pages = {49--60},
    year = {2003},
    keywords = {Internet Governance},
    publisher = {MCB UP Ltd} }

  4. L. Jean Camp and Carlos A Osorio. Privacy-enhancing technologies for internet commerce. Trust in the Network Economy, pp 317--331, 2003.
    Note: Springer.
    Keywords: E-Crime, Economics of Security, Privacy, Governance.
    @Article{ camp2003privacy,
    title = {Privacy-enhancing technologies for internet commerce},
    url = {http://papers.ssrn.com/sol3/papers.cfm?abstract_id=329282},
    author = {Camp, L. Jean and Osorio, Carlos A},
    journal = {Trust in the Network Economy},
    pages = {317--331},
    year = {2003},
    keywords = "E-Crime, Economics of Security, Privacy, Governance",
    note = {Springer} }

  5. L. Jean Camp. Designing for trust. Trust, Reputation, and Security: Theories and Practice, pp 203--209, 2003.
    Note: Springer.
    Keywords: Design for Trust, Privacy, Human-Centered Security.
    @Article{ camp2003designing,
    title = {Designing for trust},
    author = {Camp, L. Jean},
    journal = {Trust, Reputation, and Security: Theories and Practice},
    pages = {203--209},
    year = {2003},
    keywords = {Design for Trust, Privacy, Human-Centered Security},
    note = {Springer} }

  6. L. Jean Camp. First principles of copyright for DRM design. IEEE Internet Computing, 7(3):59--65, 2003.
    Note: IEEE.
    Keywords: Design for Trust, Human-Centered Security.
    @Article{ camp2003first,
    title = {First principles of copyright for DRM design},
    author = {Camp, L. Jean},
    journal = {IEEE Internet Computing},
    volume = {7},
    number = {3},
    pages = {59--65},
    year = {2003},
    keywords = {Design for Trust, Human-Centered Security},
    note = {IEEE} }

Conference publications (4)
  1. L. Jean Camp. Identity, authentication, and identifiers in digital government. In Technology and Society, 2003. Crime Prevention, Security and Design. ISTAS/CPTED 2003. Proceedings. 2003 International Symposium on, pages 10--13, 2003. IEEE.
    @InProceedings{ camp2003identity,
    title = {Identity, authentication, and identifiers in digital government},
    author = {Camp, L. Jean},
    booktitle = {Technology and Society, 2003. Crime Prevention, Security and Design. ISTAS/CPTED 2003. Proceedings. 2003 International Symposium on},
    pages = {10--13},
    year = {2003},
    organization = {IEEE} }

  2. L. Jean Camp. Open code for digital government. In Proceedings of the 2003 annual national conference on Digital government research, pages 1--2, 2003. Digital Government Society of North America.
    @InProceedings{ camp2003open,
    title = {Open code for digital government},
    author = {Camp, L. Jean},
    booktitle = {Proceedings of the 2003 annual national conference on Digital government research},
    pages = {1--2},
    year = {2003},
    organization = {Digital Government Society of North America} }

  3. Allan Friedman and L. Jean Camp. Making Security Manifest Security and Autonomy for End Users. In , 2003. TPRC.
    Keywords: Mental Models, Human-Centered Security, Economics of Security.
    @InProceedings{ friedman2003making,
    title = {Making Security Manifest Security and Autonomy for End Users},
    url = {http://www.ljean.com/files/Manifest.pdf},
    author = {Friedman, Allan and Camp, L. Jean},
    keywords = "Mental Models, Human-Centered Security, Economics of Security",
    year = {2003},
    organization = {TPRC} }

  4. Rebecca N Wright, L. Jean Camp, Ian Goldberg, Ronald L Rivest, and Graham Wood. Privacy tradeoffs: myth or reality?. In Financial Cryptography, pages 147--151, 2003. Springer Berlin Heidelberg.
    @InProceedings{ wright2003privacy,
    title = {Privacy tradeoffs: myth or reality?},
    author = {Wright, Rebecca N and Camp, L. Jean and Goldberg, Ian and Rivest, Ronald L and Wood, Graham},
    booktitle = {Financial Cryptography},
    pages = {147--151},
    year = {2003},
    organization = {Springer Berlin Heidelberg} }

Posters and Presentations (1)
  1. L. Jean Camp. Design for Trust, Trust, Reputation and Security: Theories and Practice. Ed. Rino Falcone. Springer-Verlang (Berlin), 2003.
    Keywords: Design for Trust.
    @Misc{ camp2003design,
    title = {Design for Trust, Trust, Reputation and Security: Theories and Practice. Ed. Rino Falcone},
    url = {http://papers.ssrn.com/sol3/papers.cfm?abstract_id=627610},
    author = {Camp, L. Jean},
    year = {2003},
    keywords = "Design for Trust",
    howpublished = {Springer-Verlang (Berlin)} }


BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Mon Nov 7 18:21:15 2022
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House