[ Publications of year 2006 ]

Articles in journals or book chapters (9)
  1. L. Jean Camp and Alla Genkina. Social Networks. In Phishing and Countermeasures, pages 523--550. Wiley, 2006.
    Keywords: Peer Production, Crowdsourcing of Security, Net Trust.
    @InCollection{ camp2006social,
    title = {Social Networks},
    url = {http://www.ljean.com/files/SocialNetworkSecurityExport.pdf},
    author = {Camp, L. Jean and Genkina, Alla},
    booktitle = {Phishing and Countermeasures},
    pages = {523--550},
    year = {2006},
    keywords = "Peer Production, Crowdsourcing of Security, Net Trust",
    publisher = {Wiley} }

  2. L. Jean Camp. Mental Models of Privacy and Security. IEEE Technology & Society, Vol 28 (3) 37-46, August 2006.
    Keywords: Mental Models, Net Trust.
    @Article{ jean2006mental,
    title = {Mental Models of Privacy and Security},
    url = {http://papers.ssrn.com/sol3/papers.cfm?abstract_id=922735},
    author = {Camp, L. Jean},
    month = {Aug},
    year = {2006},
    keywords = "Mental Models, Net Trust",
    journal = "IEEE Technology \& Society, Vol 28 (3) 37-46" }

  3. L. Jean Camp and others. When Proof of Work Works. 2006.
    @Article{ camp2006proof,
    title = {When Proof of Work Works},
    author = {Camp, L. Jean and others},
    year = {2006} }

  4. L. Jean Camp, Kalpana Shankar, and Kay Connelly. Systematic Design for Privacy in Ubicomp. Available at SSRN 889444, 2006.
    @Article{ camp2006systematic,
    title = {Systematic Design for Privacy in Ubicomp},
    url = {http://papers.ssrn.com/sol3/papers.cfm?abstract_id=889444},
    author = {Camp, L. Jean and Shankar, Kalpana and Connelly, Kay},
    journal = {Available at SSRN 889444},
    year = {2006} }

  5. L. Jean Camp. Reliable Usable Signals to Prevent Masquerade Attacks. Available at SSRN 894973, 2006.
    @Article{ camp2006reliable,
    title = {Reliable Usable Signals to Prevent Masquerade Attacks},
    url = {http://www.ljean.com/files/48.pdf},
    author = {Camp, L. Jean},
    journal = {Available at SSRN 894973},
    year = {2006} }

  6. L. Jean Camp. Varieties of software and their implications for effective democratic government. Proceedings of the British Academy, Vol. 135, pp. 183-185, 2006, 2006.
    Keywords: Internet Governance.
    @Article{ camp2006varieties,
    title = {Varieties of software and their implications for effective democratic government},
    url = {http://www.ssrn.com/abstract=905277},
    author = {Camp, L. Jean},
    journal = {Proceedings of the British Academy, Vol. 135, pp. 183-185, 2006},
    keywords = {Internet Governance},
    year = {2006} }

  7. Alla Genkina, L. Jean Camp, and IN Bloomington. Countermeasures: Social Networks. 2006.
    @Article{ genkinacountermeasures,
    title = {Countermeasures: Social Networks},
    author = {Genkina, Alla and Camp, L. Jean and Bloomington, IN},
    year = {2006},
    url = {http://www.ljean.com/files/SocialNetworkSecurityExport.pdf} }

  8. Suzanne Lien, Timothy Kelley, and L. Jean Camp. Expert and Non-expert Viewing Patterns When Seeking Security Cues. 2006.
    @Article{ lienexpert,
    title = {Expert and Non-expert Viewing Patterns When Seeking Security Cues},
    url = {http://dreuarchive.cra.org/2011/Lien/DREU_FINAL_Paper.pdf},
    year = {2006},
    author = {Lien, Suzanne and Kelley, Timothy and Camp, L. Jean} }

  9. Debin Liu and L. Jean Camp. Abstract and overview proof of work can work. 2006.
    @Article{ liu2006abstract,
    title = {Abstract and overview proof of work can work},
    author = {Liu, Debin and Camp, L. Jean},
    year = {2006} }

Conference publications (7)
  1. Debin Liu and L. Jean Camp. Proof of work can work. In Fifth Workshop on the Economics of Information Security, June 2006.
    Keywords: E-Crime, Economics of Information Security.
    @InProceedings{ liu2006proof,
    title = {Proof of work can work},
    url = {http://www.ljean.com/files/50.pdf},
    author = {Liu, Debin and Camp, L. Jean},
    booktitle = {Fifth Workshop on the Economics of Information Security},
    keywords = "E-Crime, Economics of Information Security",
    month = {June},
    year = {2006} }

  2. L. Jean Camp, Cathleen McGrath, and Alla Genkina. Security and Morality: A Tale of User Deceit. In , May 2006. Models of Trust for the Web MTW'06.
    Keywords: Human-Centered Security, Privacy.
    @InProceedings{ camp2006human,
    title = {Security and Morality: A Tale of User Deceit},
    author = {Camp, L. Jean and Cathleen McGrath and Alla Genkina},
    organization = {Models of Trust for the Web MTW'06},
    month = {May},
    year = {2006},
    keywords = "Human-Centered Security, Privacy",
    url = {http://www.ljean.com/files/WWW06camp.pdf} }

  3. DongInn Kim, Jeffrey M. Squyres, and Andrew Lumsdaine. The Introduction of the OSCAR Database API (ODA). In Proceedings of the 20th International Symposium on High-Performance Computing in an Advanced Collaborative Environment (HPCS'06), pages 39, May # 14-17 2006. IEEE Computer Society.
    Note: Session track: 4th Annual OSCAR Symposium (OSCAR'06).
    Keywords: OSCAR, high performance computing, cluster.
    @InProceedings{ kim:oda:oscar06,
    author = "DongInn Kim and Jeffrey M. Squyres and Andrew Lumsdaine",
    title = "{The Introduction of the OSCAR Database API (ODA)}",
    pages = "39",
    booktitle = {Proceedings of the 20th International Symposium on High-Performance Computing in an Advanced Collaborative Environment (HPCS'06)},
    year = 2006,
    month = may # "~14-17",
    publisher = "IEEE Computer Society",
    note = "Session track: 4th Annual OSCAR Symposium (OSCAR'06)",
    url = {http://www.csm.ornl.gov/oscar06/},
    keywords = "OSCAR, high performance computing, cluster",
    institution = {Lilly Endowment} }

  4. Ross Anderson, Alessandro Acquisti, L. Jean Camp, Larry Gordon, Marty Loeb, Andrew Odlyzko, Stuart Schechter, Bruce Schneier, and Rahul Telang. The Fifth Workshop on the Economics of Information Security (WEIS 2006). In Workshop: June, volume 26, pages 28, 2006.
    @InProceedings{ anderson2006fifth,
    title = {The Fifth Workshop on the Economics of Information Security (WEIS 2006)},
    author = {Anderson, Ross and Acquisti, Alessandro and Camp, L. Jean and Gordon, Larry and Loeb, Marty and Odlyzko, Andrew and Schechter, Stuart and Schneier, Bruce and Telang, Rahul},
    booktitle = {Workshop: June},
    volume = {26},
    pages = {28},
    year = {2006} }

  5. L. Jean Camp, Kay Connelly, and Lesa Lorenzen-Huber. Beyond Consent: Implications of Ubicomp for Privacy. In Telecommunications Policy Research Conference, 2006.
    @InProceedings{ camp2006beyond,
    title = {Beyond Consent: Implications of Ubicomp for Privacy},
    url = {http://www.cs.indiana.edu/~connelly/Papers/B1_BeyondConsentChapter.pdf},
    author = {Camp, L. Jean and Connelly, Kay and Lorenzen-Huber, Lesa},
    booktitle = {Telecommunications Policy Research Conference},
    year = {2006} }

  6. L. Jean Camp, Cathleen McGrath, and Alla Genkina. Security and morality: A tale of user deceit. In Models of Trust for the Web (MTW’06), Edinburgh, Scotland, volume 22, 2006. World Wide Web Conference.
    @InProceedings{ camp2006security,
    title = {Security and morality: A tale of user deceit},
    url = {http://www.ljean.com/files/WWW06camp.pdf},
    author = {Camp, L. Jean and McGrath, Cathleen and Genkina, Alla},
    booktitle = {Models of Trust for the Web (MTW’06), Edinburgh, Scotland},
    volume = {22},
    year = {2006},
    organization = {World Wide Web Conference} }

  7. L JEAN CAMP. 1. TRANSPARENCY IN COMPUTER CODE. In Proceedings of the British Academy, volume 135, pages 183--195, 2006.
    @InProceedings{ camp20061,
    title = {1. TRANSPARENCY IN COMPUTER CODE},
    author = {CAMP, L JEAN},
    booktitle = {Proceedings of the British Academy},
    volume = {135},
    pages = {183--195},
    year = {2006} }


BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Thu Oct 22 16:28:38 2020
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House