Articles in journals or book chapters (19)
  1. Nicholas Ashford, Philip K Mutooni, Christer Englund, David Clark, Carolyn Gideon, L. Jean Camp, Serena Chan, Cathleen McGrath, Helen Nissenbaum, Lee McKnight, and others. Browsing Program on Internet and Telecoms Convergence by Issue Date Research and Teaching Output of the MIT Community. . [bibtex-entry]

  2. L. Jean Camp. The Shape of the Network. . [bibtex-entry]

  3. L. Jean Camp, Alessandro Acquisti, and Tyler Moore. Workshop on Information Security Economics. . [bibtex-entry]

  4. L. Jean Camp and John Duncan. Conducting an Ethical Study of Web Traffic. . [bibtex-entry]

  5. L. Jean Camp and Allan Friedman. Peer Production of Privacy and Security Information. . [bibtex-entry]

  6. L. Jean Camp and Ka-Ping Yee. Human Implications of Technology. . [bibtex-entry]

  7. Sanchari Das, DongInn Kim, Timothy Kelley, and L Jean Camp. Grifting in the Digital Age. . [bibtex-entry]

  8. Jayati Dev, Sanchari Das, and Kaushik Srinivasan. Modularity is the Key: A New Approach to Social Media Privacy Policies. . [bibtex-entry]

  9. Views from Embeds, Hillary Elmore, L. Jean Camp, and Brandon Stephens. Diffusion and Adoption of IPv6 in the ARIN Region. . [bibtex-entry]

  10. Vaibhav Garg and L. Jean Camp. Perceptions of Computing Risks. . [bibtex-entry]

  11. Vaibhav Garg, Indiana Univeristy, L. Jean Camp, Lesa Mae Lorenzen-Huber, Kalpana Shankar, Katherine Connelly, and Kelly Caine. Privacy Framework for Older Adults. . [bibtex-entry]

  12. Alla Genkina, L. Jean Camp, and IN Bloomington. Countermeasures: Social Networks. . [bibtex-entry]

  13. Preeti Hariharan, Farzaneh Asgharpour, and L. Jean Camp. NetTrust--Socio-Technical Solution to Phishing. . [bibtex-entry]

  14. Suzanne Lien, Timothy Kelley, and L. Jean Camp. Expert and Non-expert Viewing Patterns When Seeking Security Cues. . [bibtex-entry]

  15. Clint McElroy, Pablo Moriano, and L. Jean Camp. Poster: On Predicting BGP Anomalous Incidents: A Bayesian Approach. . [bibtex-entry]

  16. Behnood Momenzadeh and L. Jean Camp. Peeling the Lemons Problem with Risk Communication for Mobile Apps. . [bibtex-entry]

  17. Pablo Moriano, Jared Pendleton, Steven Rich, and L. Jean Camp. Stopping the Insider at the Gates: Protecting Organizational Assets Through Graph Mining. . [bibtex-entry]

  18. Serena Syme and L. Jean Camp. THE ROLE OF LICENSES IN GOVERNANCE. . [bibtex-entry]

  19. Tonya Thompson and L. Jean Camp. Privacy Awareness for the Design of Pervasive Home-Based Technology for Elders. . [bibtex-entry]

Conference articles (3)
  1. Jacob Abbott, Daniel Calarco, and L Jean Camp. Factors Influencing Password Reuse: A Case Study. In TPRC46: Research Conference on Communications, Information and Internet Policy year=2018, September. TPRC.
    Keywords: Passwords, Policies, Requirements, Reuse. [bibtex-entry]

  2. Jayati Dev, Sanchari Das, and L Jean Camp. Privacy Practices, Preferences, and Compunctions: WhatsApp Users in India. In Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2018), pages 135, . Lulu. com. [bibtex-entry]

  3. Vaibhav Garg and L. Jean Camp. Macroeconomic Analysis of Malware. In Network and Distributed System Security Symposium Extended Abstracts, . [bibtex-entry]

Internal reports (2)
  1. L. Jean Camp, Tim Kelley, and Prashanth Rajivan. Instrument for Measuring Computing and Security Expertise--TR715. Technical report, Technical Report, . [bibtex-entry]

  2. L. Jean Camp, Tim Kelley, and Prashanth Rajivan. Measuring Computing and Security Expertise. Technical report, Technical Report, . [bibtex-entry]



This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

Last modified: Sat Feb 16 05:00:03 2019
Author: teamhats.

This document was translated from BibTEX by bibtex2html