[ Publications of year 2013 ]

Articles in journals or book chapters (6)
  1. Timothy Kelley and L. Jean Camp. Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections. In The Economics of Information Security and Privacy, pages 157--180. Springer Berlin Heidelberg, 2013.
    Keywords: E-Crime, Network Engineering, Privacy, Economics of Security. [bibtex-entry]

  2. Zheng Dong, Apu Kapadia, and L. Jean Camp. Pinning & binning: Real time classification of certificates. December 2013.
    Keywords: Phishing, Network Engineering. [bibtex-entry]

  3. Vaibhav Garg, Thomas Koster, and L. Jean Camp. Cross-country analysis of spambots. EURASIP Journal on Information Security, 2013(1):3, October 2013.
    Keywords: E-Crime, Economics of Security. [bibtex-entry]

  4. Vaibhav Garg and L. Jean Camp. Perceptions of Computing Risks. July 2013. [bibtex-entry]

  5. Warigia Bowman and L. Jean Camp. Protecting the Internet from Dictators Technical and Policy Solutions to Ensure Online Freedoms.. Innovation Journal, 18(1), 2013.
    Keywords: Internet Governance. [bibtex-entry]

  6. Lesa Lorenzen Huber, Kalpana Shankar, Kelly Caine, Kay Connelly, L. Jean Camp, Beth Ann Walker, and Lisa Borrero. How In-Home Technologies Mediate Caregiving Relationships in Later Life. International Journal of Human-Computer Interaction, 29(7):441--455, 2013.
    Keywords: Aging. [bibtex-entry]

Conference publications (9)
  1. Kevin Benton, L. Jean Camp, and Chris Small. OpenFlow vulnerability assessment. In Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, pages 151--152, August 2013. ACM.
    Keywords: Network Engineering. [bibtex-entry]

  2. Vaibhav Garg, Sameer Patil, Apu Kapadia, and L. Jean Camp. Peer-produced privacy protection. In Technology and Society (ISTAS), 2013 IEEE International Symposium on, pages 147--154, July 2013. IEEE.
    Keywords: Peer Production, Crowdsourcing of Security, Economics of Security. [bibtex-entry]

  3. Kevin Benton, L. Jean Camp, and Vaibhav Garg. Studying the effectiveness of android application permissions requests. In Pervasive Computing and Communications Workshops (PERCOM Workshops), 2013 IEEE International Conference on, pages 291--296, March 2013. IEEE.
    Keywords: Mental Models, Mobile Privacy. [bibtex-entry]

  4. Vaibhav Garg and L. Jean Camp. Macroeconomic Analysis of Malware. In Network and Distributed System Security Symposium Extended Abstracts, February 2013.
    Keywords: E-Crime, Economics of Security. [bibtex-entry]

  5. Majid Arianezhad, L. Jean Camp, Timothy Kelley, and Douglas Stebila. Comparative eye tracking of experts and novices in web single sign-on. In Proceedings of the third ACM conference on Data and application security and privacy, pages 105--116, 2013. ACM. [bibtex-entry]

  6. Ty Bross and L. Jean Camp. I just want your anonymized contacts! benefits and education in security & privacy research. In 2013 IEEE Security and Privacy Workshops, pages 1--6, 2013. IEEE. [bibtex-entry]

  7. L. Jean Camp. Beyond usability: Security interactions as risk perceptions. In Workshop on Risk Perception in IT Security and Privacy, Newcastle, UK. http://citeseerx. ist. psu. edu/viewdoc/download, 2013. [bibtex-entry]

  8. Vaibhav Garg and L. Jean Camp. Ex ante vs. ex post: Economically efficient sanctioning regimes for online risks. In , 2013. TPRC. [bibtex-entry]

  9. Aarathi Prasad, Ronald Peterson, Shrirang Mare, Jacob Sorber, Kolin Paul, and David Kotz. Provenance framework for mHealth. In Proceedings of the Workshop on Networked Healthcare Technology (NetHealth), January 2013.
    Keywords: ists, mhealth, privacy, project-tish, security, wearable. [bibtex-entry]

Posters and Presentations (1)
  1. L. Jean Camp. Translucent Security: Security Interactions as Risk Perceptions. A SOUPS Workshop, July 2013.
    Keywords: Mental Models. [bibtex-entry]



This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

Last modified: Wed Jan 20 01:00:04 2021
Author: teamhats.

This document was translated from BibTEX by bibtex2html and is customized by IU IoT House