[ Publications of year 2011 ]

Articles in journals or book chapters (12)
  1. K. Lorenzen-Huber, L. Boutain, M., Camp, L. Jean, Shankar, K., Connelly. Privacy, Independence, and Relationships: Older Adults’ Perceptions of Home-Based Ubiquitous Technologies. In , pages 232--252. 2011.
    Keywords: Human-Centered Security.
    @InCollection{ lorenzen2011,
    title = {Privacy, Independence, and Relationships: Older Adults’ Perceptions of Home-Based Ubiquitous Technologies},
    author = {Lorenzen-Huber, L. Boutain, M., Camp, L. Jean, Shankar, K., Connelly, K.},
    keywords = "Human-Centered Security",
    organization = {Aging International},
    pages = {232--252},
    url = {http://www.ljean.com/files/ageinginternational.pdf},
    year = {2011} }

  2. Vaibhav Garg and L. Jean Camp. Heuristics and Biases: Implications for Security Design. IEEE Technology & Society, March 2011.
    Note: IEEE.
    Keywords: Mental Models.
    @Article{ garg2011heuristics,
    title = {Heuristics and Biases: Implications for Security Design},
    url = {http://www.ljean.com/files/Biases.pdf},
    author = {Garg, Vaibhav and Camp, L. Jean},
    journal = {IEEE Technology \& Society},
    keywords = "Mental Models",
    year = {2011},
    month = {March},
    note = {IEEE} }

  3. L. Jean Camp and Kalpana Shankar. CONSTRUCTING THE OLDER USER IN HOME-BASED UBIQUITOUS COMPUTING. The Social Impact of Social Computing, pp 110, 2011.
    Note: Sheffield Hallam University.
    @Article{ camp2011constructing,
    title = {CONSTRUCTING THE OLDER USER IN HOME-BASED UBIQUITOUS COMPUTING},
    author = {Camp, L. Jean and Shankar, Kalpana},
    journal = {The Social Impact of Social Computing},
    pages = {110},
    year = {2011},
    note = {Sheffield Hallam University} }

  4. L. Jean Camp. Reconceptualizing the Role of Security User. Daedalus, 140(4):93--107, 2011.
    Keywords: Human-Centered Security, Peer Production, Crowdsourcing of Security, Economics of Information Security.
    @Article{ camp2011reconceptualizing,
    title = {Reconceptualizing the Role of Security User},
    url = {http://www.ljean.com/files/SecurityPublicGood.pdf},
    author = {Camp, L. Jean},
    journal = {Daedalus},
    volume = {140},
    number = {4},
    pages = {93--107},
    year = {2011},
    keywords = "Human-Centered Security, Peer Production, Crowdsourcing of Security, Economics of Information Security",
    publisher = {MIT Press} }

  5. L. Jean Camp. Computer security and, versus, or security informatics: keynote address. Journal of Computing Sciences in Colleges, 26(4):113--114, 2011.
    @Article{ camp2011computer,
    title = {Computer security and, versus, or security informatics: keynote address},
    url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.136.5601&rep=rep1&type=pdf},
    author = {Camp, L. Jean},
    journal = {Journal of Computing Sciences in Colleges},
    volume = {26},
    number = {4},
    pages = {113--114},
    year = {2011},
    publisher = {Consortium for Computing Sciences in Colleges} }

  6. Zheng Dong and L. Jean Camp. The decreasing marginal value of evaluation network size. ACM SIGCAS Computers and Society, 41(1):23--37, 2011.
    Keywords: Mental Models, Economics of Information Security.
    @Article{ dong2011decreasing,
    title = {The decreasing marginal value of evaluation network size},
    url = {http://www.cs.indiana.edu/~zhdong/publication/NetworkSize.pdf},
    author = {Dong, Zheng and Camp, L. Jean},
    journal = {ACM SIGCAS Computers and Society},
    volume = {41},
    number = {1},
    pages = {23--37},
    keywords = "Mental Models, Economics of Information Security",
    year = {2011},
    publisher = {ACM} }

  7. John F Duncan, L. Jean Camp, and William R Hazlewood. The Portal Monitor: A Privacy-Aware Event-Driven. Smart Healthcare Applications and Services: Developments and Practices, pp 219, 2011.
    Note: IGI Global.
    @Article{ duncan2011portal,
    title = {The Portal Monitor: A Privacy-Aware Event-Driven},
    author = {Duncan, John F and Camp, L. Jean and Hazlewood, William R},
    journal = {Smart Healthcare Applications and Services: Developments and Practices},
    pages = {219},
    year = {2011},
    note = {IGI Global} }

  8. Vaibhav Garg, L. Jean Camp, LM Lorenzen-Huber, and Katherine Connelly. Designing risk communication for older adults. Proceedings of Ethicomp, Sheffield, UK, 2011.
    @Article{ garg2011designing,
    title = {Designing risk communication for older adults},
    author = {Garg, Vaibhav and Camp, L. Jean and Lorenzen-Huber, LM and Connelly, Katherine},
    journal = {Proceedings of Ethicomp, Sheffield, UK},
    year = {2011} }

  9. Vaibhav Garg, Indiana Univeristy, L. Jean Camp, Lesa Mae Lorenzen-Huber, Kalpana Shankar, Katherine Connelly, and Kelly Caine. Privacy Framework for Older Adults. 2011.
    @Article{ gargprivacy,
    title = {Privacy Framework for Older Adults},
    url = {https://www.heinz.cmu.edu/~acquisti/SHB/Privacy\ 0.000000ramework\ 0.000000or\%20Older0X0.07FFC3461DDDP-1022dults.pdf},
    author = {Garg, Vaibhav and Univeristy, Indiana and Camp, L. Jean and Lorenzen-Huber, Lesa Mae and Shankar, Kalpana and Connelly, Katherine and Caine, Kelly},
    booktitle = {Workshop on Security and Human Behavior, Pittsburgh, PA},
    year = {2011} }

  10. Debin Liu, Ninghui Li, XiaoFeng Wang, and L. Jean Camp. Security Risk Management using Incentives. IEEE Security and Privacy, 2011.
    Note: IEEE Computer Society.
    Keywords: Economics of Information Security.
    @Article{ liu2011security,
    title = {Security Risk Management using Incentives},
    url = {http://dl.acm.org/citation.cfm?id=2086562},
    author = {Liu, Debin and Li, Ninghui and Wang, XiaoFeng and Camp, L. Jean},
    journal = {IEEE Security and Privacy},
    year = {2011},
    keywords = {Economics of Information Security},
    note = {IEEE Computer Society} }

  11. Lesa Lorenzen-Huber, Mary Boutain, L. Jean Camp, Kalpana Shankar, and Kay H Connelly. Privacy, Technology, and Aging: A Proposed Framework. Ageing International, 36(2):232--252, 2011.
    @Article{ lorenzen2011privacy,
    title = {Privacy, Technology, and Aging: A Proposed Framework},
    url = {http://www.ljean.com/files/ageinginternational.pdf},
    author = {Lorenzen-Huber, Lesa and Boutain, Mary and Camp, L. Jean and Shankar, Kalpana and Connelly, Kay H},
    journal = {Ageing International},
    volume = {36},
    number = {2},
    pages = {232--252},
    year = {2011},
    publisher = {Springer New York} }

  12. Tonya Thompson and L. Jean Camp. Privacy Awareness for the Design of Pervasive Home-Based Technology for Elders. 2011.
    @Article{ thompsonprivacy,
    title = {Privacy Awareness for the Design of Pervasive Home-Based Technology for Elders},
    url = {http://www.publicsphereproject.org/events/diac08/proceedings/08.Privacy_Awareness.Thompson_and_Camp.pdf},
    year = {2011},
    author = {Thompson, Tonya and Camp, L. Jean} }

Conference publications (5)
  1. Vaibhav Garg, Nathaniel Husted, and L. Jean Camp. The smuggling theory approach to organized digital crime. In eCrime Researchers Summit (eCrime), 2011, pages 1--7, November 2011. IEEE.
    Keywords: E-Crime, Economics of Information Security.
    @InProceedings{ garg2011smuggling,
    title = {The smuggling theory approach to organized digital crime},
    url = {http://www.ljean.com/files/Smuggling_Paper.pdf},
    author = {Garg, Vaibhav and Husted, Nathaniel and Camp, L. Jean},
    booktitle = {eCrime Researchers Summit (eCrime), 2011},
    pages = {1--7},
    month = {November},
    year = {2011},
    keywords = "E-Crime, Economics of Information Security",
    organization = {IEEE} }

  2. Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, and David Kotz. Adapt-lite: Privacy-aware, Secure, and Efficient mHealth Sensing. In Proceedings of the Workshop on Privacy in the Electronic Society (WPES), October 2011.
    Keywords: ists, mhealth, privacy, project-tish, security, wearable, wifi.
    @InProceedings{ mare:hns-w,
    author = {Shrirang Mare and Jacob Sorber and Minho Shin and Cory Cornelius and David Kotz},
    booktitle = wpes,
    doi = {10.1145/2046556.2046574},
    entrysubtype = {workshop},
    keywords = {ists, mhealth, privacy, project-tish, security, wearable, wifi},
    month = {October},
    numpages = {6},
    title = {Adapt-lite: Privacy-aware, Secure, and Efficient {mH}ealth Sensing},
    year = {2011} }

  3. Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, and David Kotz. Adaptive security and privacy for mHealth sensing. In Proceedings of the USENIX Workshop on Health Security (HealthSec), August 2011.
    Note: Short paper.
    Keywords: ists, mhealth, position, privacy, project-tish, security, wearable, wifi.
    @InProceedings{ mare11-adaptlite,
    author = {Shrirang Mare and Jacob Sorber and Minho Shin and Cory Cornelius and David Kotz},
    booktitle = usenix-healthsec,
    entrysubtype = {positionpaper},
    keywords = {ists, mhealth, position, privacy, project-tish, security, wearable, wifi},
    month = {August},
    note = {Short paper.},
    title = {Adaptive security and privacy for {mH}ealth sensing},
    url = {https://www.shrirangmare.com/papers/mare2011-healthsec.pdf},
    year = {2011} }

  4. Jim Blythe, L. Jean Camp, and Vaibhav Garg. Targeted risk communication for computer security. In Proceedings of the 16th international conference on Intelligent user interfaces, pages 295--298, February 2011. ACM.
    Keywords: Mental Models.
    @InProceedings{ blythe2011targeted,
    title = {Targeted risk communication for computer security},
    url = {http://www.ljean.com/files/TargetRisk.pdf},
    author = {Blythe, Jim and Camp, L. Jean and Garg, Vaibhav},
    booktitle = {Proceedings of the 16th international conference on Intelligent user interfaces},
    pages = {295--298},
    keywords = "Mental Models",
    month = {February},
    year = {2011},
    organization = {ACM} }

  5. L Lorenzen Huber, L Borrero, B Walker, K Shankar, K Caine, K Connelly, and L. Jean Camp. HOW OLDER ADULTS USE INFORMATION TECHNOLOGY TO REDUCE CAREGIVER BURDEN. In GERONTOLOGIST, volume 51, pages 18--18, 2011. OXFORD UNIV PRESS INC JOURNALS DEPT, 2001 EVANS RD, CARY, NC 27513 USA.
    @InProceedings{ huber2011older,
    title = {HOW OLDER ADULTS USE INFORMATION TECHNOLOGY TO REDUCE CAREGIVER BURDEN},
    author = {Huber, L Lorenzen and Borrero, L and Walker, B and Shankar, K and Caine, K and Connelly, K and Camp, L. Jean},
    booktitle = {GERONTOLOGIST},
    volume = {51},
    pages = {18--18},
    year = {2011},
    organization = {OXFORD UNIV PRESS INC JOURNALS DEPT, 2001 EVANS RD, CARY, NC 27513 USA} }

Internal reports (1)
  1. Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, and David Kotz. Hide-n-Sense: Privacy-aware secure mHealth sensing. Technical report TR2011-702, Dartmouth Computer Science, September 2011.
    Keywords: ignore, ists, mhealth, privacy, project-tish, security, wearable, wifi.
    @TechReport{ mare:hns-tr,
    author = {Shrirang Mare and Jacob Sorber and Minho Shin and Cory Cornelius and David Kotz},
    entrysubtype = {None},
    institution = {Dartmouth Computer Science},
    keywords = {ignore, ists, mhealth, privacy, project-tish, security, wearable, wifi},
    month = {September},
    number = {TR2011-702},
    title = {Hide-n-{S}ense: Privacy-aware secure {mH}ealth sensing},
    url = {http://www.cs.dartmouth.edu/reports/TR2011-702.pdf},
    year = {2011} }

Posters and Presentations (1)
  1. L. Jean Camp, Kurt Weisman, and Shaun McDermott. Medication Administration And Patient Health Management Strategies, And Systems For Same, Mar # 30 2011.
    Note: US Patent App. 13/075,546.
    @Misc{ camp2011medication,
    title = {Medication Administration And Patient Health Management Strategies, And Systems For Same},
    author = {Camp, L. Jean and Weisman, Kurt and McDermott, Shaun},
    year = {2011},
    month = mar # "~30",
    note = {US Patent App. 13/075,546} }


BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Thu Oct 22 16:28:37 2020
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House