[ Publications of year 2004 ]

Books and proceedings (1)
  1. L. Jean Camp. Economics of Information Security. Springer US, 2004.
    Keywords: Economics of Information Security.
    @Book{ camp2004econbook,
    author = {Camp, L. Jean},
    title = {Economics of Information Security},
    pages = {17--34},
    year = {2004},
    keywords = {Economics of Information Security},
    publisher = {Springer US} }

Articles in journals or book chapters (7)
  1. L. Jean Camp and Allan Friedman. Security in Peer to Peer Systems. In The Handbook of Information Security. John Wiley & Sons, 2004.
    Keywords: Peer Production, Crowdsourcing of Security.
    @InCollection{ camp2004security,
    title = {Security in Peer to Peer Systems},
    url = {http://allan.friedmans.org/papers/P2Psecurity.pdf},
    author = {Camp, L. Jean and Friedman, Allan},
    booktitle = {The Handbook of Information Security},
    year = {2004},
    keywords = "Peer Production, Crowdsourcing of Security",
    publisher = {John Wiley \& Sons} }

  2. L. Jean Camp and Catherine Wolfram. Pricing security. In Economics of Information Security, pages 17--34. Springer US, 2004.
    Keywords: Economics of Information Security.
    @InCollection{ camp2004pricing,
    title = {Pricing security},
    url = {http://www.ljean.com/files/isw.pdf},
    author = {Camp, L. Jean and Wolfram, Catherine},
    booktitle = {Economics of Information Security},
    pages = {17--34},
    year = {2004},
    keywords = {Economics of Information Security},
    publisher = {Springer US} }

  3. L. Jean Camp, Fu-Shoun Mao, and Mridul Chowdhury. Thailand at the crossroads. International Journal of Technology, Policy and Management, 4(2):116--135, 2004.
    Keywords: Internet Governance.
    @Article{ camp2004thailand,
    title = {Thailand at the crossroads},
    url = {http://www.inderscience.com/search/index.php?action=record&rec_id=4816&prevQuery=&ps=10&m=or},
    author = {Camp, L. Jean and Mao, Fu-Shoun and Chowdhury, Mridul},
    journal = {International Journal of Technology, Policy and Management},
    volume = {4},
    number = {2},
    pages = {116--135},
    year = {2004},
    keywords = {Internet Governance},
    publisher = {Inderscience} }

  4. L. Jean Camp. Digital Identity. IEEE Technology & Society, 23(3):34--41, 2004.
    Keywords: Human-Centered Security.
    @Article{ camp2004identity,
    title = {Digital Identity},
    author = {Camp, L. Jean},
    journal = {IEEE Technology \& Society},
    volume = {23},
    number = {3},
    pages = {34--41},
    url = {http://papers.ssrn.com/sol3/papers.cfm?abstract_id=615187},
    keywords = "Human-Centered Security",
    year = {2004} }

  5. L. JeanL Camp. Digital identity. IEEE Technology and Society Magazine, 23(3):34--41, 2004.
    Note: IEEE.
    @Article{ camp2004digital,
    title = {Digital identity},
    author = {Camp, L. JeanL},
    journal = {IEEE Technology and Society Magazine},
    volume = {23},
    number = {3},
    pages = {34--41},
    year = {2004},
    note = {IEEE} }

  6. Rebecca T Mercuri and L. Jean Camp. The code of elections. Communications of the ACM, 47(10):52--57, 2004.
    Note: ACM.
    @Article{ mercuri2004code,
    title = {The code of elections},
    author = {Mercuri, Rebecca T and Camp, L. Jean},
    journal = {Communications of the ACM},
    volume = {47},
    number = {10},
    pages = {52--57},
    year = {2004},
    note = {ACM} }

  7. Charles Vincent and L. Jean Camp. Looking to the Internet for models of governance. Ethics and Information Technology, 6(3):161--173, 2004.
    Keywords: Internet Governance.
    @Article{ vincent2004looking,
    title = {Looking to the Internet for models of governance},
    url = {http://papers.ssrn.com/sol3/papers.cfm?abstract_id=615201},
    author = {Vincent, Charles and Camp, L. Jean},
    journal = {Ethics and Information Technology},
    volume = {6},
    number = {3},
    pages = {161--173},
    year = {2004},
    keywords = {Internet Governance},
    publisher = {Kluwer Academic Publishers} }

Conference publications (3)
  1. L. Jean Camp and Allan Friedman. Peer Patching--Rapid Response in Distributed Systems. In 24th Army Science Conference, December 2004.
    Keywords: Peer Production, Crowdsourcing of Security.
    @InProceedings{ camp2004peer,
    title = {Peer Patching--Rapid Response in Distributed Systems},
    url = {http://www.ljean.com/files/ArmyPeerPatching.pdf},
    author = {Camp, L. Jean and Friedman, Allan},
    booktitle = {24th Army Science Conference},
    keywords = "Peer Production, Crowdsourcing of Security",
    month = {December},
    year = {2004} }

  2. L. Jean Camp and Allan Friedman. Good neighbors can make good fences: A peer-to-peer user security system. In Telecommunications Policy and Research Conference, 2004.
    @InProceedings{ camp2004good,
    title = {Good neighbors can make good fences: A peer-to-peer user security system},
    author = {Camp, L. Jean and Friedman, Allan},
    booktitle = {Telecommunications Policy and Research Conference},
    year = {2004} }

  3. L. Jean Camp. Mental models of computer security. In Financial Cryptography, pages 106--111, 2004. Springer Berlin Heidelberg.
    @InProceedings{ camp2004mental,
    title = {Mental models of computer security},
    url = {http://papers.ssrn.com/sol3/papers.cfm?abstract_id=922735},
    author = {Camp, L. Jean},
    booktitle = {Financial Cryptography},
    pages = {106--111},
    year = {2004},
    organization = {Springer Berlin Heidelberg} }

Posters and Presentations (1)
  1. L. Jean Camp and Stephen Lewis. Economics of information security. Springer Science & Business Media, 2004.
    @Misc{ camp2004economics,
    title = {Economics of information security},
    author = {Camp, L. Jean and Lewis, Stephen},
    year = {2004},
    howpublished = {Springer Science \& Business Media} }


BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Thu Oct 22 15:55:32 2020
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House