2022 (9)
  1. Joshua Streiff, Tatiana Ringenberg, Jayati Dev, and L.Jean Camp. Everyone’s Flag: Using Entry Level Capture the Flag to Engage Low SES Student Groups. ECGBL, October 2022.
    Keywords: IoT. [bibtex-key = streiff2022_ecgbl_poster] [bibtex-entry]

  2. Laura Schneider, Pnina Fichman, and Ece Gumusel. Online Disinhibition in Global Imagined Communities During COVID-19 Lockdown. In , May 2022.
    Keywords: COVID-19, Lockdown, Facebook groups, Social media, Online disinhibition, Imagined Communities. [bibtex-key = schneidercovid2022] [bibtex-entry]

  3. Ece Gumusel. Preliminary Analysis of Data Subject Right Effectiveness and Blockages in Industry. In , March 2022.
    Keywords: privacy, information policy, information ethics. [bibtex-key = gumusel2022databroker] [bibtex-entry]

  4. Jacob Abbott, Jayati Dev, Donginn Kim, Shakthidhar Gopavaram, Meera Iyer, Shivani Sadam, Shrirang Mare, Tatiana Ringenberg, Vafa Andalibi, and L. Jean Camp. Privacy Lessons Learnt from Deploying an IoT Ecosystem in the Home. In Proceedings of the 2022 European Symposium on Usable Security, EuroUSEC '22, New York, NY, USA, pages 98–110, 2022. Association for Computing Machinery.
    Keywords: Security, user interviews, smart home, IoT, 2FA, privacy. [bibtex-key = abbott2022privacy] [bibtex-entry]

  5. Jacob Abbott, Jofish Kaye, and James Clawson. Identifying an Aurally Distinct Phrase Set for Text Entry Techniques. In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems, CHI '22, New York, NY, USA, 2022. Association for Computing Machinery.
    Keywords: text-to-speech, accessibility, text entry, TTS, synthesized speech, input techniques.
    Abstract: In the last decade, interest in accessible and eyes-free text entry has continued to grow. However, little research has been done to explore the feasibility of using audibly distinct phrases for text entry tasks. To better understand whether preexisting phrases used in text entry research are sufficiently distinct for eyes-free text entry tasks, we used Microsoft’s and Apple’s desktop text-to-speech systems to generate all 500 phrases from MacKenzie and Soukoreff’s set [32] using the default male and female voices. We then asked 392 participants recruited through Amazon’s Mechanical Turk to transcribe the generated audio clips. We report participant transcription errors and present the 96 phrases that were observed with no comprehension errors. These phrases were further tested with 80 participants who identified as low-vision and/or blind recruited through Twitter. We contribute the 92 phrases that were observed to maintain no comprehension errors across both experiments.
    [bibtex-key = abbott2022identifying] [bibtex-entry]

  6. Peter Caven, Shakthi Gopavaram, and L. Jean Camp. Integrating Human Intelligence to Bypass Information Asymmetry In Procurement Decision Making. In MILCOM, 2022.
    Keywords: Labels, SBOM. [bibtex-key = covensok22] [bibtex-entry]

  7. Ece Gumusel, Vincent Q Malic, Devan Ray Donaldson, Kevin Ashley, and Xiaozhong Liu. An Annotation Schema for the Detection of Social Bias in Legal Text Corpora. In In iConference 2022 Proceedings, 2022.
    Keywords: Artificial intelligence, Information ethics, Machine learning, Natural language processing. [bibtex-key = gumusel2022legal] [bibtex-entry]

  8. Joshua Streiff, Naheem Noah, and Sanchari Das. A Call for a New Privacy and Security Regime for IoT Smart Toys. In IEEE Conference on Dependable and Secure Computing (IEEE DSC 2022), 2022. IEEE.
    Keywords: IoT. [bibtex-key = streiff2022_ieee_dsc] [bibtex-entry]

  9. Zitao Zhang, Jacob Abbott, Sanchari Das, and L. Jean Camp. Building an Authentication Infrastructure — Designing a Two Factor Authentication Hardware Token with Form Factor that Encourages Engagement. In TPRC 2022: The 50th Research Conference on Communication, Information and Internet Policy, 2022. Social Science Research Network.
    Keywords: Security, UX, 2FA. [bibtex-key = zhang2022building] [bibtex-entry]

2021 (17)
  1. Vafa Andalibi, Jayati Dev, DongInn Kim, Eliot Lear, and L Jean Camp. Is Visualization Enough? Evaluating the Efficacy of MUD-Visualizer in Enabling Ease of Deployment for Manufacturer Usage Description (MUD). In Annual Computer Security Applications Conference, pages 337--348, December 2021.
    Keywords: IoT, MUD, MUD-Visualizer. [bibtex-key = andalibi2021visualization] [bibtex-entry]

  2. Hilda Hadan, Skyler Johnson, Katherine Ferro, and L. Jean Camp. Human and Organizational Factors in Public Key Certificate Authority Failures. ACM CCS, 11 2021. [bibtex-key = hhadan2021ccs] [bibtex-entry]

  3. Laura Calloway, Lesa Huber, and L. Jean Camp. Privacy and Usability in COVID Enrollment Apps. Poster at GSA Annual Meeting (Gerontological Society of America, 2021), ONLINE, November 2021.
    Keywords: privacy, health. [bibtex-key = lcallowa2021gsa] [bibtex-entry]

  4. Laura Calloway. Harm Reduction for Internet of Things Devices. Presentation at Annual Meeting of Society For Social Studies Of Science (4S, 2021), Toronto, CA, Virtual, October 2021.
    Keywords: privacy, health, IoT, surveillance. [bibtex-key = lcallowa20214s] [bibtex-entry]

  5. L Jean Camp, Shakthidhar Gopavaram, Jayati Dev, and Ece Gumusel. Lessons for Labeling from Risk communication. In Workshop and Call for Papers on Cybersecurity Labeling Programs for Consumers: Internet of Things (IoT) Devices and Software, September 2021.
    Keywords: Privacy and Security Labels, IoT. [bibtex-key = camp2021lessons] [bibtex-entry]

  6. Jayati Dev, Shakthidhar Gopavaram, Ece Gumusel, and L Jean Camp. A Consumer-focused Modular Approach to Labeling IoT Devices and Software. In Workshop and Call for Papers on Cybersecurity Labeling Programs for Consumers: Internet of Things (IoT) Devices and Software, September 2021.
    Keywords: Privacy and Security Labels, IoT. [bibtex-key = jayati2021modularity] [bibtex-entry]

  7. Shakthidhar Gopavaram, Jayati Dev, Ece Gumusel, and L Jean Camp. Going Beyond Labels. In Workshop and Call for Papers on Cybersecurity Labeling Programs for Consumers: Internet of Things (IoT) Devices and Software, September 2021.
    Keywords: Privacy and Security Labels, IoT. [bibtex-key = gopavaram2021going] [bibtex-entry]

  8. Joshua Streiff. Cybersecurity & You. A Brown Co. Schools Speaker Series, September 2021.
    Keywords: K12. [bibtex-key = streiff2021brownco] [bibtex-entry]

  9. L. Jean Camp Ashley Bochner, Jacob Abbott. Potential Reuse of University Credentials. Poster at the Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), August 2021.
    Keywords: Passwords, Security, Authentication. [bibtex-key = bochner2021] [bibtex-entry]

  10. Corey Allen and Joshua Streiff. Sleeping Alone: Detecting and Countering Hidden Cameras in AirBnB Environments. IU GROUPS STEM Poster (IN), July 2021.
    Keywords: IoT. [bibtex-key = allen2021_poster] [bibtex-entry]

  11. Joshua Streiff. Finding Alice & Bob: Using BLE to Locate Victims & First Responders in Buildings. IU IDER Poster (IN), July 2021.
    Keywords: IoT. [bibtex-key = streiff2021_poster] [bibtex-entry]

  12. Vafa Andalibi, Jayati Dev, DongInn Kim, Eliot Lear, and Jean Camp. Making Access Control Easy in IoT. In IFIP International Symposium on Human Aspects of Information Security & Assurance, June 2021.
    Keywords: IoT, MUD, MUD-Visualizer. [bibtex-key = andalibi2021mudvizuserstudy] [bibtex-entry]

  13. Shakthidhar Gopavaram, Jayati Dev, Sanchari Das, and L Jean Camp. IoT Marketplace: Willingness-To-Pay vs. Willingness-To-Accept. In Proceedings of the 20th Annual Workshop on the Economics of Information Security (WEIS 2021), June 2021.
    Keywords: IoT, Privacy Labels, Marketplace, Psychological Biases. [bibtex-key = gopavaram2021iot] [bibtex-entry]

  14. Joshua Streiff. Online Safety For All Ages. Life Lessons 4H Series for High School Students Workshop, June 2021.
    Keywords: K12. [bibtex-key = streiff2021_4h] [bibtex-entry]

  15. Vafa Andalibi, Eliot Lear, DongInn Kim, and Jean Camp. On the Analysis of MUD-Files' Interactions, Conflicts, and Configuration Requirements Before Deployment. In 5th EAI International Conference on Safety and Security in Internet of Things, SaSeIoT, May 2021. Springer.
    Keywords: IoT, MUD, MUD-Visualizer. [bibtex-key = andalibi2021mudviz] [bibtex-entry]

  16. Shakthidhar Gopavaram, Jayati Dev, Marthie Grobler, DongInn Kim, Sanchari Das, and L Jean Camp. Cross-National Study on Phishing Resilience. In Proceedings of the Workshop on Usable Security and Privacy (USEC), May 2021.
    Keywords: Phishing. [bibtex-key = gopavaram2021cross] [bibtex-entry]

  17. DongInn Kim, Vafa Andalibi, and L Jean Camp. Protecting IoT Devices through Localized Detection of BGP Hijacks for Individual Things. In SafeThings 2021, Oakland, May 2021. IEEE Workshop on the Internet of Safe Things.
    Keywords: Fingerprinting, IoT. [bibtex-key = dikim21:bgp_hijacking] [bibtex-entry]

2020 (18)
  1. Marthie Grobler, M.A.P. Chamikara, Jacob Abbott, Surya Nepal, and Cecil Paris. The Importance of Social Identity on Password Formulation. Personal and Ubiquitous Computing, November 2020.
    Keywords: Passwords, Security, Privacy, International, Authentication. [bibtex-key = grobler2020importance] [bibtex-entry]

  2. Hilda Hadan and Sameer Patil. Understanding Perceptions of Smart Devices. In International Conference on Financial Cryptography and Data Security, 08 2020.
    Keywords: IoT. [bibtex-key = hhadan2020iot] [bibtex-entry]

  3. Andy Puga and Joshua Streiff. Hunting for the Internet of Things: An Educational BLE Scavanger Hunt Game. IU GROUPS STEM Poster (IN), July 2020.
    Keywords: IoT. [bibtex-key = puga2020_poster] [bibtex-entry]

  4. Lizbeth Roque, Emily Sung, and Joshua Streiff. Gaming For Cyber Kids: Building Manipulative Cyber Educational Games for Grades 7th-8th. IU GROUPS STEM Poster (IN), July 2020.
    Keywords: IoT. [bibtex-key = roque2020_poster] [bibtex-entry]

  5. DongInn Kim, Vafa Andalibi, and L Jean Camp. Fingerprinting Edge and Cloud Services in IoT. In Systematic Approaches to Digital Forensic Engineering, City University of New York (CUNY), New York City, May 2020. IEEE Computer Society.
    Keywords: Fingerprinting, IoT. [bibtex-key = dikim20:block_pi] [bibtex-entry]

  6. L. Jean Camp, Ryan Henry, Tadayoshi Kohno, Shrirang Mare, Steven Myers, Shwetak Patel, and Joshua Streiff. Towards a Secure IoT: Directions for IoT Research. IEEE Security \& Privacy, 2020.
    Note: To appear. [bibtex-key = camp19-iot] [bibtex-entry]

  7. Jayati Dev, Emilee Rader, and Sameer Patil. Why Johnny Can’t Unsubscribe: Barriers to Stopping Unwanted Email. 2020.
    Keywords: Privacy, Emails, User Study, human factors. [bibtex-key = devjohnny] [bibtex-entry]

  8. Jayati Dev. Discussing Privacy and Surveillance on Twitter: A Case Study of COVID-19. arXiv preprint arXiv:2006.06815, 2020.
    Keywords: Privacy, Computational Social Science, Social Network Privacy, human factors, surveillance, internet governance. [bibtex-key = dev2020discussing] [bibtex-entry]

  9. Shakthidhar Reddy Gopavaram, Omkar Bhide, and L. Jean Camp. Can You Hear Me Now? Audio and Visual Interactions That Change App Choices. Frontiers in Psychology, 11:2227, 2020.
    Keywords: Mobile Privacy, Marketplace. [bibtex-key = gopavaramcan] [bibtex-entry]

  10. Hilda Hadan, Laura Calloway, Shakthidhar Gopavaram, Shrirang Mare, and L. Jean Camp. Ameriecan Privacy Perceptions in the COVID Pandemic. Annals of Disaster Risk Sciences, 2020. [bibtex-key = hhadan2020adrs] [bibtex-entry]

  11. Shrirang Mare, Franziska Roesner, and Tadayoshi Kohno. Smart Devices in Airbnbs: Considering Privacy and Security for both Guests and Hosts. Proceedings on Privacy Enhancing Technologies (PoPETs), 2020(2), 2020.
    Note: To appear. [bibtex-key = mare20-airbnb] [bibtex-entry]

  12. Behnood Momenzadeh, Helen Dougherty, Matthew Remmel, Steven Myers, and L Jean Camp. Best Practices Would Make Things Better in the IoT. IEEE Security & Privacy, 2020.
    Keywords: IoT. [bibtex-key = momenzadeh2020best] [bibtex-entry]

  13. Jacob Abbott and Sameer Patil. How Mandatory Second Factor Affects the Authentication User Experience. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, CHI ’20, New York, NY, USA, pages 1–13, 2020. Association for Computing Machinery.
    Keywords: Security, UX, 2FA. [bibtex-key = abbott2020mandatory] [bibtex-entry]

  14. L Jean Camp. All Security Is Good (s): Design Guidance for Economics. In Enigma, 2020. Usenix.
    Keywords: Mental Models, Network Engineering, Economics of Security. [bibtex-key = camp2020all] [bibtex-entry]

  15. Sanchari Das, Jacob Abbott, Shakthidhar Gopavaram, Jim Blythe, and L Jean Camp. User-Centered Risk Communication for Safer Browsing. In Proceedings of the First Asia USEC-Workshop on Usable Security, In Conjunction with the Twenty-Fourth International Conference International Conference on Financial Cryptography and Data Security, 2020.
    Keywords: Phishing, Risk Communication, Privacy, Security. [bibtex-key = das2020user] [bibtex-entry]

  16. Jayati Dev and L Jean Camp. User Engagement with Chatbots: A Discursive Psychology Approach. In Proceedings of the 2nd Conference on Conversational User Interfaces, pages 1--4, 2020.
    Keywords: AI, Social Network Privacy, human factors. [bibtex-key = dev2020user] [bibtex-entry]

  17. Jayati Dev, Pablo Moriano, and L Jean Camp. Lessons Learnt from Comparing WhatsApp Privacy Concerns Across Saudi and Indian Populations. In Sixteenth Symposium on Usable Privacy and Security (\{SOUPS\} 2020), pages 81--97, 2020.
    Keywords: Privacy, International, Social Network Privacy, human factors. [bibtex-key = dev2020lessons] [bibtex-entry]

  18. Behnood Momenzadeh, Shakthidhar Gopavaram, Sanchari Das, and L Jean Camp. Bayesian Evaluation of User App Choices in the Presence of Risk Communication on Android Devices. In International Symposium on Human Aspects of Information Security and Assurance, pages 211--223, 2020. Springer.
    Keywords: Mobile Privacy, Usable Privacy, Usability. [bibtex-key = momenzadeh2020bayesian] [bibtex-entry]

2019 (31)
  1. Sanchari Das, Andrew Kim, Shrirang Mare, Joshua Streiff, and L. Jean Camp. Security Mandates are Pervasive: An Inter-School Study on Analyzing User Authentication Behavior. In Proceedings of the IEEE Humans and Cyber Security Workshop, December 2019.
    Keywords: referred. [bibtex-key = das19-mandates] [bibtex-entry]

  2. Hamid Mehmood, Tallal Ahmad, Lubna Razaq, Shrirang Mare, Maryem Zafar Usmani, Richard J. Anderson, and Agha Ali Raza. Towards Digitization of Collaborative Savings Among Low-Income Groups. Proceedings of the ACM on Human-Computer Interaction (PACM HCI), 3(CSCW), November 2019.
    Keywords: referred. [bibtex-key = mehmood19-rosca] [bibtex-entry]

  3. Laura Calloway. Corporate Infrastructural Expansion as Big Data Surveillance. Presentation at Annual Meeting of Society For Social Studies Of Science (4S, 2019), New Orleans, Louisiana, September 2019.
    Keywords: privacy, policies, governance, surveillance. [bibtex-key = lcallowa20194s] [bibtex-entry]

  4. Joshua Streiff, Vafa Andalibi, and Sanchari Das. Securtle: The Security Turtle. A Bsides STL Workshop, September 2019.
    Keywords: IoT. [bibtex-key = streiff2019stl] [bibtex-entry]

  5. Joshua Streiff. Practical Cybersecurity and Manipulative Gaming Education. A Flipping the Switch! Cybersecurity Workshop Session at Indiana Department of Education Workshop, September 2019.
    Keywords: IoT. [bibtex-key = streiff2019switch] [bibtex-entry]

  6. Joshua Streiff, Vafa Andalibi, and Sanchari Das. Eyes In Your Child’s Bedroom: Exploiting Child Data Risks with Smart Toys. A Bsides MSP Workshop, September 2019.
    Keywords: IoT. [bibtex-key = streiff2019msp] [bibtex-entry]

  7. Joshua Streiff. Educational Hacking Using Command Line & Bluetooth Low Energy. An Avon STEM Educator Leadership Day Workshop, September 2019.
    Keywords: IoT. [bibtex-key = streiff2019avon] [bibtex-entry]

  8. Joshua Streiff. Bears, Unicorns, & Crockpots, Oh My! An Introduction to Internet of Things (IoT) Threat Modeling Education. An AI & Connected Conference Workshop, September 2019.
    Keywords: IoT. [bibtex-key = streiff2019ai] [bibtex-entry]

  9. Joshua Streiff. Cybersecurity & You. A Brown Co. Schools Speaker Series, September 2019.
    Keywords: K12. [bibtex-key = streiff2019brownco] [bibtex-entry]

  10. Vafa Andalibi, DongInn Kim, and L. Jean Camp. Throwing MUD into the FOG: Defending IoT and Fog by expanding MUD to Fog network. In 2nd USENIX Workshop on Hot Topics in Edge Computing (HotEdge 19), Renton, WA, July 2019. USENIX Association.
    Keywords: MUD, IoT. [bibtex-key = 234809] [bibtex-entry]

  11. Hilda Hadan, Nicolas Serrano, Sanchari Das, and L. Jean Camp. Making IoT Worthy of Human Trust. In Social Science Research Network, 07 2019.
    Keywords: PKI. [bibtex-key = hhadan2019pki_iot] [bibtex-entry]

  12. Fahad Pervaiz, Rai Shah Nawaz, Muhammad Umer Ramzan, Maryem Zafar Usmani, Shrirang Mare, Kurtis Heimerl, Faisal Kamiran, Richard J. Anderson, and Lubna Razaq. An Assessment of SMS Fraud in Pakistan. In Proceedings of the ACM SIGCAS Conference on Computing and Sustainable Societies (COMPASS), July 2019.
    Keywords: referred. [bibtex-key = pervaiz19-sms-fraud] [bibtex-entry]

  13. Aditya Vashistha, Richard J. Anderson, and Shrirang Mare. Examining the Use and Non-Use of Mobile Payment Systems for Merchant Payments in India. In Proceedings of the ACM SIGCAS Conference on Computing and Sustainable Societies (COMPASS), July 2019.
    Keywords: referred. [bibtex-key = vashistha19-mps] [bibtex-entry]

  14. Niang Chin, Joshua Streiff, and Sameer Patil. The Overly Friendly Crockpot. Trusted CI Poster Session (IL), July 2019.
    Keywords: IoT. [bibtex-key = chin2019_poster] [bibtex-entry]

  15. Nathaly Reynaga, Behnod Momensadeh, Joshua Streiff, and Sameer Patil. The One Where Patty Trusted Her Printer: The Threat of IoT Printers. IU GROUPS STEM Poster (IN), July 2019.
    Keywords: IoT. [bibtex-key = reynaga2019_poster] [bibtex-entry]

  16. Joshua Streiff. Capturing Education: CTF and IoT in K-12 Education. A Luddy Hall Pathfinders Workshop, July 2019.
    Keywords: IoT. [bibtex-key = streiff2019pathfinders] [bibtex-entry]

  17. Jonathan Schubauer, Anjanette Raymond, and Dhruv Madappa. Over-Priviliged Permission: Using Technology and Design to Create Privacy Compliance. In , June 2019. IACL.
    Keywords: Mobile Privacy, Governance, Privacy. [bibtex-key = 2019jschubau] [bibtex-entry]

  18. Jeremy Gummeson, Mary Baker, Animesh Srivastava, and Shrirang Mare. Controlling devices based on collocation of the devices on a user. U.S. Patent 10,331,916, June 2019.
    Keywords: authentication, ctbh, ists, mhealth, patent, project-tish, security, sensors, wearable. [bibtex-key = gummeson:patent10331916] [bibtex-entry]

  19. DongInn Kim and L Jean Camp. Block-Pi: Defending against Man In The Middle (MITM) Attacks at the Edge. Society for Risk Analysis, SRA 2019, Buffalo NY, June 2019.
    Keywords: Phishing. [bibtex-key = dikim19:block_pi_post] [bibtex-entry]

  20. L. Jean Camp and Sanchari Das. Studies of 2FA, Why Johnny Can’t Use 2FA and How We Can Change That?. In . Springer US, March 2019.
    Keywords: 2FA, authentication, human factors, usability. [bibtex-key = rsatwofactor] [bibtex-entry]

  21. Shrirang Mare, Logan Girvin, Franziska Roesner, and Tadayoshi Kohno. Consumer Smart Homes: Where We Are and Where We Need to Go. In Proceedings of the Workshop on Mobile Computing Systems and Applications (HotMobile), February 2019.
    Keywords: referred. [bibtex-key = mare19-smart-home] [bibtex-entry]

  22. Shrirang Mare, Reza Rawassizadeh, Ronald Peterson, and David Kotz. Continuous Smartphone Authentication using Wristbands. In Proceedings of the Workshop on Usable Security and Privacy (USEC), February 2019.
    Keywords: workshop. [bibtex-key = mare19-csaw] [bibtex-entry]

  23. Shakthidhar Reddy Gopavaram, Jayati Dev, Sanchari Das, and Jean Camp. IoTMarketplace: Informing Purchase Decisions with Risk Communication. 2019.
    Keywords: IoT, Mental Models, Mobile Privacy. [bibtex-key = gopavaram2019iotmarketplace] [bibtex-entry]

  24. Jacob Abbott, Gege Gao, and Patrick Shih. Creen: A Carbon Footprint Calculator Designed for Calculation in Context. In International Conference on Information, pages 769--776, 2019. Springer.
    Keywords: Sustainability, IoT, HCI. [bibtex-key = abbott2019creen] [bibtex-entry]

  25. Jacob Abbott, Novia Nurain Haley MacLeod, Gustave Ekobe, and Sameer Patil. Local Standards for Anonymization Practices in Health, Wellness, Accessibility, and Aging Research at CHI. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019. ACM.
    Keywords: Health, Privacy, Anonymization. [bibtex-key = abbott2019local] [bibtex-entry]

  26. Sanchari Das, Andrew Kim, Shrirang Mare, Joshua Streiff, and L Jean Camp. Security Mandates are Pervasive: An Inter-School Study on Analyzing User Authentication Behavior. In IEEE HUMANS AND CYBER SECURITY WORKSHOP (HACS 2019), 2019. IEEE.
    Keywords: 2FA. [bibtex-key = streiff2019security] [bibtex-entry]

  27. Sanchari Das, Joshua Streiff, Lisa Huber, and L Jean Camp. WHY DON'T ELDERS ADOPT TWO-FACTOR AUTHENTICATION? BECAUSE THEY ARE EXCLUDED BY DESIGN. In Innovation in Aging, Volume 3, Issue Supplement_1, November 2019, pages S325–S326, 2019. GOA.
    Keywords: 2FA. [bibtex-key = streiff2019why] [bibtex-entry]

  28. Nicolas Serrano, Hilda Hadan, and L. Jean Camp. A Complete Study of P.K.I. (PKI’s Known Incidents). In The 47th Research Conference on Communications, Information, and Internet Policy, 2019. TPRC.
    Keywords: PKI. [bibtex-key = serrano2019pkistudy] [bibtex-entry]

  29. Kushal Shah, Shrirang Mare, and Richard J. Anderson. Understanding Mobile Money Grievances from Tweets. In Proceedings of the International Conference on Information and Communication Technologies and Development (ICTD), January 2019.
    Keywords: poster. [bibtex-key = shah19-tweets] [bibtex-entry]

  30. Joshua Streiff, Sanchari Das, and Joshua Cannon. Overpowered and Underprotected Toys Empowering Parents with Tools to Protect Their Children. In IEEE HUMANS AND CYBER SECURITY WORKSHOP (HACS 2019), 2019. IEEE.
    Keywords: IoT. [bibtex-key = streiff2019overpowered] [bibtex-entry]

  31. Joshua Streiff, Connie Justice, and L Jean Camp. Escaping to Cybersecurity Education: Using Manipulative Challenges to Engage and Educate. In Proceedings of the 13th European Conference on Games Based Learning, pages 1046--1050, 2019. ACPI.
    Keywords: IoT. [bibtex-key = streiff2019escaping] [bibtex-entry]

2018 (22)
  1. Shrirang Mare, Reza Rawassizadeh, Ronald Peterson, and David Kotz. SAW: Wristband-based Authentication for Desktop Computers. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), 2(3), September 2018.
    Keywords: referred. [bibtex-key = mare18-saw] [bibtex-entry]

  2. Jacob Abbott, Daniel Calarco, and L Jean Camp. Factors Influencing Password Reuse: A Case Study. In TPRC46: Research Conference on Communications, Information and Internet Policy, September 2018. TPRC.
    Keywords: Passwords, Policies. [bibtex-key = abbott2018factors] [bibtex-entry]

  3. P. Moriano, R. Hill, and L. J. Camp. Hijacking Network Traffic: Temporal Analysis of Adverse Changes in the Internet Topology. In Conference on Complex Systems, Thessaloniki, Greece, September 2018.
    Keywords: BGP. [bibtex-key = moriano:2018:bgp:graph:similarity] [bibtex-entry]

  4. Joshua Streiff. How Santa knows if you are Naughty or Nice: How your IoT toys can spy on you. A SPICE Colloquium Speaker Series, September 2018.
    Keywords: IoT. [bibtex-key = streiff2018santa] [bibtex-entry]

  5. Rowan Phipps, Shrirang Mare, Peter Ney, Jennifer Webster, and Kurtis Heimerl. ThinSIM-based Attacks on Mobile Money Systems. In Proceedings of the ACM SIGCAS Conference on Computing and Sustainable Societies (COMPASS), June 2018.
    Keywords: referred. [bibtex-key = phipps18-thinsim] [bibtex-entry]

  6. Aditya Vashistha, Richard J. Anderson, and Shrirang Mare. Examining Security and Privacy Research in Developing Regions. In Proceedings of the ACM SIGCAS Conference on Computing and Sustainable Societies (COMPASS), June 2018.
    Keywords: referred. [bibtex-key = vashistha18-examining] [bibtex-entry]

  7. Sanchari Das, DongInn Kim, Timothy Kelley, and L Jean Camp. Grifting in the Digital Age, Analyzing Risk Communication Tools. eCrime APWG 2018, Sandiego CA, May 2018.
    Keywords: Phishing. [bibtex-key = dikim18:toolbar_presentation] [bibtex-entry]

  8. Andr?s D. Molina-Markham, Shrirang Mare, Ronald Peterson, Jr., and David Kotz. Continuous seamless mobile device authentication using a separate electronic wearable apparatus. U.S. Patent 9,961,547, May 2018.
    Keywords: authentication, ctbh, ists, mhealth, patent, project-tish, security, sensors, wearable. [bibtex-key = molina-markham:patent9961547] [bibtex-entry]

  9. Sanchari Das, DongInn Kim, Timothy Kelley, and L Jean Camp. Grifting in the Digital Age, Analyzing Risk Communication Tools. Midwest Security Workshop 2018, Washington DC, April 2018.
    Keywords: Phishing. [bibtex-key = dikim18:toolbar_poster] [bibtex-entry]

  10. David Kotz, Ryan Halter, Cory Cornelius, Jacob Sorber, Minho Shin, Ronald Peterson, Shrirang Mare, Aarathi Prasad, Joseph Skinner, and Andr?s Molina-Markham. Wearable computing device for secure control of physiological sensors and medical devices, with secure storage of medical records, and bioimpedance biometric. U.S. Patent 9,936,877; International Patent Application WO2013096954A1, April 2018.
    Keywords: ctbh, ists, mhealth, patent, project-amulet, security, sensors, wearable. [bibtex-key = kotz:patent9936877] [bibtex-entry]

  11. Clint McElroy, Pablo Moriano, and L. Jean Camp. Poster: On Predicting BGP Anomalous Incidents: A Bayesian Approach. February 2018.
    Keywords: BGP, E-Crime, Network Engineering, Governance. [bibtex-key = mcelroyposter] [bibtex-entry]

  12. Jonathan Schubauer, David Argast, and L. Jean Camp. Lessig was Right: Influences on Android Permissions. United States Federal Trade Commission PrivacyCon Conference, February 2018.
    Keywords: Mobile Privacy, Governance. [bibtex-key = 2018jschubau] [bibtex-entry]

  13. Jayati Dev, Sanchari Das, and Kaushik Srinivasan. Modularity is the Key: A New Approach to Social Media Privacy Policies. 2018.
    Keywords: Privacy, Social Network Privacy, human factors, internet governance. [bibtex-key = dev2018modularity] [bibtex-entry]

  14. Pablo Moriano, Jared Pendleton, Steven Rich, and L. Jean Camp. Stopping the Insider at the Gates: Protecting Organizational Assets Through Graph Mining. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 9(1):4--29, 2018.
    Keywords: Insider Threat. [bibtex-key = moriano:2018:stopping:insider:gates:jowua] [bibtex-entry]

  15. Paul van Schaik, Jurjen Jansen, Joseph Onibokun, L. Jean Camp, and Petko Kusev. Security and privacy in online social networking: Risk perceptions and precautionary behaviour. Computers in Human Behavior, 78:283--297, 2018.
    Note: Pergamon.
    Keywords: Mental Models, Human-Centered Computing,. [bibtex-key = van2018security] [bibtex-entry]

  16. Sanchari Das, Jayati Dev, and Kaushik Srinivasan. Modularity is the Key: A New Approach to Social Media Privacy Policies. In ACM, 2018. MEXIHC 2018.
    Keywords: Privacy, Social Network Privacy, human factors, internet governance. [bibtex-key = das2018modularity] [bibtex-entry]

  17. Sanchari Das, Andrew Dingman, and L. Jean Camp. Why Johnny Doesn’t Use Two Factor A Two-Phase Usability Study of the FIDO U2F Security Key. In 2018 International Conference on Financial Cryptography and Data Security (FC), 2018.
    Keywords: 2FA. [bibtex-key = das2018johnny] [bibtex-entry]

  18. Jayati Dev, Sanchari Das, and L Jean Camp. Privacy Practices, Preferences, and Compunctions: WhatsApp Users in India. In Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2018), pages 135, 2018. Lulu. com.
    Keywords: Privacy, Cultural, Social Network Privacy, human factors. [bibtex-key = dev2018privacy] [bibtex-entry]

  19. Jayati Dev, Sanchari Das, and L Jean Camp. Understanding privacy concerns of whatsapp users in India: poster. In Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, pages 28, 2018. ACM.
    Keywords: Privacy, Cultural, Social Network Privacy, human factors. [bibtex-key = dev2018understanding] [bibtex-entry]

  20. Andrew Dingman, Gianpaolo Russo, George Osterholt, Tyler Uffelman, and L. Jean Camp. Good Advice That Just Doesn't Help. In 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI), pages 289--291, 2018. IEEE.
    Keywords: Mental Models, IoT, Governance. [bibtex-key = dingman2018good] [bibtex-entry]

  21. C. McElroy, P. Moriano, and L. J. Camp. Poster: On Predicting BGP Anomalous Incidents: A Bayesian Approach. In Network and Distributed System Security Symposium (NDSS), 2018.
    Keywords: BGP. [bibtex-key = c.-mcelroy:2018:bayesian:bgp] [bibtex-entry]

  22. Joshua Streiff, Olivia Kenny, Sanchari Das, Andrew Leeth, and L Jean Camp. Who's Watching Your Child? Exploring Home Security Risks with Smart Toy Bears. In Internet-of-Things Design and Implementation (IoTDI), 2018 IEEE/ACM Third International Conference on, pages 285--286, 2018. IEEE.
    Keywords: IoT. [bibtex-key = streiff2018s] [bibtex-entry]

2017 (11)
  1. Shrirang Mare, Andr?s Molina-Markham, Ronald Peterson, and David Kotz. System, method and authorization device for biometric access control to digital devices. U.S. Patent 9,832,206; International Patent Application WO2014153528A2, November 2017.
    Keywords: authentication, ctbh, ists, mhealth, patent, project-tish, security, sensors, wearable. [bibtex-key = mare:patent9832206] [bibtex-entry]

  2. Shrirang Mare, Richard J. Anderson, and Aditya Vashistha. Security and privacy design considerations for low-literate users in developing regions. In Proceedings of the Workshop on Inclusive Privacy and Security at Symposium On Usable Privacy and Security (SOUPS WIPS), July 2017.
    Keywords: position. [bibtex-key = mare17-considerations] [bibtex-entry]

  3. Eric Zheng, Shrirang Mare, and Franziska Roesner. End User Security & Privacy Concerns with Smart Homes. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS), July 2017.
    Keywords: referred. [bibtex-key = zheng17-smart-home] [bibtex-entry]

  4. Sanchari Das, Gianpaolo Russo, Andrew C Dingman, Jayati Dev, Olivia Kenny, and L Jean Camp. A Qualitative Study on Usability and Acceptability of Yubico Security Key. 2017.
    Keywords: Privacy, two-factor authentication, human factors. [bibtex-key = das2017qualitative] [bibtex-entry]

  5. Lesa Huber and L. Jean Camp. User-Driven Design in Smart Homes: Ethical Aspects. Handbook of Smart Homes, Health Care and Well-Being, pp 93--103, 2017.
    Note: Springer International Publishing. [bibtex-key = huber2017user] [bibtex-entry]

  6. Pablo Moriano, Soumya Achar, and L. Jean Camp. Incompetents, criminals, or spies: Macroeconomic analysis of routing anomalies. Computers & Security, 70:319--334, 2017.
    Note: Elsevier Advanced Technology.
    Keywords: Governance, Macroeconomics, BGP, E-Crime. [bibtex-key = moriano:2017:macro:bgp] [bibtex-entry]

  7. Prashanth Rajivan, Pablo Moriano, Timothy Kelley, and L. Jean Camp. Factors in an end user security expertise instrument. Information & Computer Security, 25(2):190--205, 2017.
    Note: Emerald Publishing Limited. [bibtex-key = rajivan2017factors] [bibtex-entry]

  8. Vafa Andalibi, Francois Christophe, and Tommi Mikkonen. Analysis of Paradoxes in Fingerprint Countermeasures. In Proceedings of the 21st Conference of Open Innovations Association FRUCT, University of Helsinki, Helsinki, Finland, 2017. FRUCT Oy.
    Keywords: Browser Fingerprinting, End-User Privacy. [bibtex-key = andalibi2017analysis] [bibtex-entry]

  9. Sanchari Das, Javon Goard, and Dakota Murray. How Celebrities Feed Tweeples with Personal and Promotional Tweets: Celebrity Twitter Use and Audience Engagement. In Proceedings of the 8th International Conference on Social Media & Society, pages 30, 2017. ACM.
    Keywords: Social Network. [bibtex-key = das2017celebrities] [bibtex-entry]

  10. Haley MacLeod, Jacob Abbott, and Sameer Patil. Small Data Privacy Protection: An Exploration of the Utility of Anonymized Data of People with Rare Diseases. In Proceedings of the 2017 Workshop on Interactive Systems in Healthcare (WISH’17), 2017.
    Keywords: Privacy, Health, Anonymization. [bibtex-key = macleod2017small] [bibtex-entry]

  11. Pablo Moriano, Jared Pendleton, Steven Rich, and L. Jean Camp. Insider Threat Event Detection in User-System Interactions. In 9th ACM CCS International Workshop on Managing Insider Security Threats (MIST), Dallas, TX, USA, pages 1--12, 2017.
    Keywords: Insider Threat. [bibtex-key = moriano:2017:insider:treat:graph:mining] [bibtex-entry]

2016 (17)
  1. Kevin Benton, L. Jean Camp, and Martin Swany. Bongo: A BGP speaker built for defending against bad routes. In Military Communications Conference, MILCOM 2016-2016 IEEE, pages 735--739, November 2016. IEEE.
    Keywords: Network Engineering. [bibtex-key = benton2016bongo] [bibtex-entry]

  2. Kevin Benton and L. Jean Camp. Preventing Data Exfiltration via Political and Geographic Routing Policies. Available at SSRN 2753133, October 2016.
    Keywords: E-Crime, Economics of Security. [bibtex-key = benton2016preventing] [bibtex-entry]

  3. Kevin Benton and L. Jean Camp. Firewalling Scenic Routes: Preventing Data Exfiltration via Political and Geographic Routing Policies. In Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense, pages 31--36, October 2016. ACM.
    Keywords: Network Engineering, Economics of Security. [bibtex-key = benton2016firewalling] [bibtex-entry]

  4. Zheng Dong, Kevin Kane, and L. Jean Camp. Detection of Rogue Certificates from Trusted Certificate Authorities Using Deep Neural Networks. ACM Transactions on Privacy and Security (TOPS), 19(2):5, September 2016.
    Keywords: Network Engineering. [bibtex-key = dong2016detection] [bibtex-entry]

  5. Shrirang Mare, Mary Baker, and Jeremy Gummeson. A Study of Authentication in Daily Life. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS), June 2016.
    Keywords: referred. [bibtex-key = mare16-study] [bibtex-entry]

  6. Shrirang Mare. Seamless Authentication for Ubiquitous Devices. PhD thesis, Dartmouth College Computer Science, May 2016.
    Note: Available as Dartmouth Computer Science Technical Report TR2016-793.
    Keywords: techreport. [bibtex-key = mare16-authentication] [bibtex-entry]

  7. Zheng Dong, Kevin Kane, Siyu Chen, and L. Jean Camp. The New Wildcats: High-Risk Banking From Worst-Case Certificate Practices Online. April 2016.
    Keywords: E-Crime, Economics of Security. [bibtex-key = dongnew] [bibtex-entry]

  8. Kevin Benton, L. Jean Camp, Tim Kelley, and Martin Swany. Filtering Source-Spoofed IP Traffic Using Feasible Path Reverse Path Forwarding with SDN. International Journal of Computer and Communication Engineering, 5(6):441, 2016.
    Keywords: SDN. [bibtex-key = benton2016filtering] [bibtex-entry]

  9. L JEAN CAMP and LESA LORENZEN HUBER. PRIVACY IMPLICATIONS OF AWARE, ACTIVE, AND ADAPTIVE TECHNOLOGIES. Gerontechnology: Research, Practice, and Principles in the Field of Technology and Aging, 2016.
    Note: Springer Publishing Company. [bibtex-key = camp2016privacy] [bibtex-entry]

  10. Pablo Moriano, Soumya Achar, and L. Jean Camp. Macroeconomic Analysis of Routing Anomalies. Available at SSRN 2755699, 2016.
    Keywords: E-Crime, Network Engineering, Economics of Security. [bibtex-key = moriano2016macroeconomic] [bibtex-entry]

  11. Prashanth Rajivan and L. Jean Camp. Too Much Too Late: Influence of risk communication on Android App installations--UNDER REVIEW. 2016. [bibtex-key = rajivantoo] [bibtex-entry]

  12. L. Jean Camp, Jacob Abbott, and Siyu Chen. CPasswords: Leveraging Episodic Memory and Human-Centered Design for Better Authentication. In 2016 49th Hawaii International Conference on System Sciences (HICSS), pages 3656--3665, January 2016. IEEE.
    Keywords: Security, Passwords, Usability, Authentication. [bibtex-key = camp2016cpasswords] [bibtex-entry]

  13. Gary M Deckard and L. Jean Camp. Measuring efficacy of a classroom training week for a cybersecurity training exercise. In Technologies for Homeland Security (HST), 2016 IEEE Symposium on, pages 1--6, 2016. IEEE. [bibtex-key = deckard2016measuring] [bibtex-entry]

  14. P. Moriano, S. Achar, and L. Jean Camp. Poster: Macroeconomic Analysis of Routing Anomalies. In Conference on Communication, Information and Internet Policy (TPRC), Arlington, VA, USA, 2016.
    Keywords: Governance, Macroeconomics, E-Crime. [bibtex-key = moriano:2016:macro:tprc] [bibtex-entry]

  15. Prashanth Rajivan and L. Jean Camp. Influence of Privacy Attitude and Privacy Cue Framing on Android App Choices. In Symposium on Usable Privacy and Security (SOUPS), 2016.
    Keywords: Mobile Privacy. [bibtex-key = rajivan2016influence] [bibtex-entry]

  16. Prashanth Rajivan, Pablo Moriano, Timothy Kelley, and L. Jean Camp. What Can Johnny Do?--Factors in an End-User Expertise Instrument.. In HAISA, pages 199--208, 2016. [bibtex-key = rajivan2016can] [bibtex-entry]

  17. Yasmeen Rashidi, Kami Vaniea, and L. Jean Camp. Understanding Saudis’ privacy concerns when using WhatsApp. In Proceedings of the Workshop on Usable Security (USEC’16), 2016. [bibtex-key = rashidi2016understanding] [bibtex-entry]

2015 (14)
  1. Siyu Chen, Timothy Kelley, Zheng Dong, and L. Jean Camp. The Effects of HeartBleed on Certificate Change: Meh. ACSAC Poster Session (LA, CA), December 2015.
    Keywords: Network Engineering. [bibtex-key = chen2015_poster] [bibtex-entry]

  2. Greg Norcie and L. Jean Camp. The Price Of Privacy: An Examination of the Economic Costs of Abstention from Social Networks. 2015 Amsterdam Privacy Conference (APC 2015), October 2015.
    Keywords: Privacy, Peer Production, Crowdsourcing of Security, Internet Governance. [bibtex-key = norcieprice] [bibtex-entry]

  3. Kevin Benton, L. Jean Camp, Tim Kelley, and Martin Swany. Filtering IP source spoofing using feasible path reverse path forwarding with SDN. In Communications and Network Security (CNS), 2015 IEEE Conference on, pages 733--734, September 2015. IEEE.
    Keywords: Network Engineering, SDN. [bibtex-key = benton2015filtering] [bibtex-entry]

  4. Zheng Dong, Apu Kapadia, Jim Blythe, and L. Jean Camp. Beyond the lock icon: real-time detection of phishing websites using public key certificates. In Electronic Crime Research (eCrime), 2015 APWG Symposium on, pages 1--12, May 2015. IEEE.
    Keywords: Phishing, E-Crime. [bibtex-key = dong2015beyond] [bibtex-entry]

  5. Vaibhav Garg and L. Jean Camp. Spare the rod, spoil the network security? Economic analysis of sanctions online. In Electronic Crime Research (eCrime), 2015 APWG Symposium on, pages 1--10, May 2015. IEEE.
    Keywords: E-Crime. [bibtex-key = garg2015spare] [bibtex-entry]

  6. Vaibhav Garg and L. Jean Camp. Cars, Condoms, and Facebook. In Information Security, pages 280--289. Springer International Publishing, 2015.
    Keywords: Mental Models, Human-Centered Security, Privacy. [bibtex-key = garg2015cars] [bibtex-entry]

  7. Jacob Abbott and Violeta Moreno Garcia. Password differences based on language and testing of memory recall. NNGT International Journal of Information Security, 2:1--6, 2015.
    Keywords: Passwords, Security, Usability, Authentication, International. [bibtex-key = abbott2015password] [bibtex-entry]

  8. L. Jean Camp. Respecting people and respecting privacy. Communications of the ACM, 58(7):27--28, 2015.
    Note: ACM. [bibtex-key = camp2015respecting] [bibtex-entry]

  9. V Garg and L. Jean Camp. Risk Characteristics, Mental Models, and Perception of Security Risks. Academy of Science and Engineering, USA, 2015. [bibtex-key = garg2015risk] [bibtex-entry]

  10. Vaibhav Garg and L. Jean Camp. Why cybercrime?. ACM SIGCAS Computers and Society, 45(2):20--28, 2015.
    Keywords: E-Crime. [bibtex-key = garg2015cybercrime] [bibtex-entry]

  11. L. Jean Camp. Security and Privacy Interactions as Risk Communication. In 2015 AAAS Annual Meeting (12-16 February 2015), 2015. aaas. [bibtex-key = camp2015security] [bibtex-entry]

  12. Ben Miller, Jennifer Olive, Shakthidhar Reddy Gopavaram, Yanjun Zhao, Ayush Shrestha, and Cynthia Berger. A method for cross-document narrative alignment of a two-hundred-sixty-million word corpus. In 2015 IEEE International Conference on Big Data (Big Data), pages 1673--1677, 2015. IEEE. [bibtex-key = miller2015method] [bibtex-entry]

  13. Ben Miller, Ayush Shrestha, Jennifer Olive, and Shakthidhar Reddy Gopavaram. Cross-Document Narrative Frame Alignment. In 6th Workshop on Computational Models of Narrative (CMN 2015), 2015. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik. [bibtex-key = sgopavar2015cross] [bibtex-entry]

  14. L. Jean Camp, Tim Kelley, and Prashanth Rajivan. Measuring Computing and Security Expertise. Technical report, Technical Report, 2015. [bibtex-key = campmeasuring] [bibtex-entry]

2014 (16)
  1. Jacob Abbott, Violeta Moreno, and L. Jean Camp. Password Differences based on Language and Testing of Memory Recall. Annual Computer Security Applications Conference, (New Oleans, LA), December 2014.
    Keywords: Passwords, Usability, User Study. [bibtex-key = abbott2014_poster] [bibtex-entry]

  2. Shrirang Mare, Andr?s Molina-Markham, Cory Cornelius, Ronald Peterson, and David Kotz. ZEBRA: Zero-Effort Bilateral Recurring Authentication. In Proceedings of the IEEE Symposium on Security and Privacy (S{\& }P), May 2014.
    Note: The project has been renamed SAW.
    Keywords: referred. [bibtex-key = mare14-zebra] [bibtex-entry]

  3. Shrirang Mare, Andr?s Molina-Markham, Cory Cornelius, Ronald Peterson, and David Kotz. ZEBRA: Zero-Effort Bilateral Recurring Authentication (Companion report). Technical report TR2014-748, Dartmouth Computer Science, May 2014.
    Note: This project has been renamed SAW.
    Keywords: techreport. [bibtex-key = mare14-zebra-tr] [bibtex-entry]

  4. Greg Norcie, Jim Blythe, Kelly Caine, and L. Jean Camp. Why Johnny Can’t Blow the Whistle: Identifying and Reducing Usability Issues in Anonymity Systems. In Proceedings of the Network and Distributed System Security Symposium (NDSS) Workshop on Usable Security (USEC), February 2014.
    Keywords: Human-Centered Security. [bibtex-key = norcie2014johnny] [bibtex-entry]

  5. Cory Cornelius, Zachary Marois, Jacob Sorber, Ron Peterson, Shrirang Mare, and David Kotz. Vocal resonance as a biometric for pervasive wearable devices. Technical report TR2014-747, Dartmouth Computer Science, February 2014.
    Keywords: authentication, ists, project-tish, security, sensors, wearable. [bibtex-key = cornelius:voice-tr] [bibtex-entry]

  6. Chris Hall, Dongting Yu, Zhi-li Zhang, Jonathan Stout, Andrew Odlyzko, Andrew W Moore, L. Jean Camp, Kevin Benton, and Ross Anderson. Collaborating with the enemy on network management. In Security Protocols XXII, pages 154--162. Springer International Publishing, 2014.
    Keywords: Network Engineering. [bibtex-key = hall2014collaborating] [bibtex-entry]

  7. Terry Davis, Jon M Peha, Eric Burger, L. Jean Camp, and Dan Lubar. Risking it All: Unlocking the Backdoor to the Nation's Cybersecurity. Available at SSRN 2468604, 2014. [bibtex-key = davis2014risking] [bibtex-entry]

  8. Vaibhav Garg, L. Jean Camp, Lesa Lorenzen-Huber, Kalpana Shankar, and Kay Connelly. Privacy concerns in assisted living technologies. annals of telecommunications-annales des t?l?communications, 69(1-2):75--88, 2014.
    Keywords: Aging. [bibtex-key = garg2014privacy] [bibtex-entry]

  9. Hilda Hadan. On the Application of Two-Dimensional Code in Television Production and Broadcasting. International Broadband Network, 2014. [bibtex-key = hhadan2014oct_qr] [bibtex-entry]

  10. Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, and David Kotz. Hide-n-Sense: Preserving Privacy Efficiently in Wireless mHealth. Mobile Networks and Applications (MONET), 19(3), 2014. [bibtex-key = mare14-hide-n-sense] [bibtex-entry]

  11. Martina Angela Sasse, Charles C Palmer, Markus Jakobsson, Sunny Consolvo, Rick Wash, and L. Jean Camp. Helping you protect you. IEEE Security & Privacy, 12(1):39--42, 2014. [bibtex-key = sasse2014helping] [bibtex-entry]

  12. Berkay Aydin, Dustin Kempton, Vijay Akkineni, Shakthidhar Reddy Gopavaram, Karthik Ganesan Pillai, and Rafal Angryk. Spatiotemporal indexing techniques for efficiently mining spatiotemporal co-occurrence patterns. In 2014 IEEE international conference on big data (Big Data), pages 1--10, 2014. IEEE. [bibtex-key = sgopavar2014spatiotemporal] [bibtex-entry]

  13. Zheng Dong, Kevin Kane, and L. Jean Camp. Phishing in Smooth Waters: The State of Banking Certificates in the US. In 2014 TPRC Conference Paper, 2014.
    Keywords: Phishing, E-Crime. [bibtex-key = dong2014phishing] [bibtex-entry]

  14. Vaibhav Garg, Kevin Benton, and L. Jean Camp. The Privacy Paradox: A Facebook Case Study. In 2014 Telecommunications Policy Research Conference (TPRC), Arlington VA, 2014.
    Keywords: Mental Models, Human-Centered Security, Social Network Privacy, Aging. [bibtex-key = garg2014privacyparadox] [bibtex-entry]

  15. L. Jean Camp, Ross Anderson, Zhi-Lang Zhang, Chris Hall, Chris Small, Tim Kelley, and others. Hardening Software Defined Networks. Technical report, INDIANA UNIV AT BLOOMINGTON, 2014. [bibtex-key = camp2014hardening] [bibtex-entry]

  16. Mart?n Abadi, Hal Abelson, Alessandro Acquisti, Mihir Bellare, Steven Bellovin, Matt Blaze, L. Jean Camp, and Ran Canetti. An open letter from US researchers in cryptography and information security, 2014. [bibtex-key = abadi2014open] [bibtex-entry]

2013 (16)
  1. Zheng Dong, Apu Kapadia, and L. Jean Camp. Pinning & binning: Real time classification of certificates. December 2013.
    Keywords: Phishing, Network Engineering. [bibtex-key = dong2013pinning] [bibtex-entry]

  2. Vaibhav Garg, Thomas Koster, and L. Jean Camp. Cross-country analysis of spambots. EURASIP Journal on Information Security, 2013(1):3, October 2013.
    Keywords: E-Crime, Economics of Security. [bibtex-key = garg2013cross] [bibtex-entry]

  3. Kevin Benton, L. Jean Camp, and Chris Small. OpenFlow vulnerability assessment. In Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, pages 151--152, August 2013. ACM.
    Keywords: Network Engineering. [bibtex-key = benton2013openflow] [bibtex-entry]

  4. Vaibhav Garg and L. Jean Camp. Perceptions of Computing Risks. July 2013. [bibtex-key = gargperceptions] [bibtex-entry]

  5. Vaibhav Garg, Sameer Patil, Apu Kapadia, and L. Jean Camp. Peer-produced privacy protection. In Technology and Society (ISTAS), 2013 IEEE International Symposium on, pages 147--154, July 2013. IEEE.
    Keywords: Peer Production, Crowdsourcing of Security, Economics of Security. [bibtex-key = garg2013peer] [bibtex-entry]

  6. L. Jean Camp. Translucent Security: Security Interactions as Risk Perceptions. A SOUPS Workshop, July 2013.
    Keywords: Mental Models. [bibtex-key = jean2013translucent] [bibtex-entry]

  7. Kevin Benton, L. Jean Camp, and Vaibhav Garg. Studying the effectiveness of android application permissions requests. In Pervasive Computing and Communications Workshops (PERCOM Workshops), 2013 IEEE International Conference on, pages 291--296, March 2013. IEEE.
    Keywords: Mental Models, Mobile Privacy. [bibtex-key = benton2013studying] [bibtex-entry]

  8. Vaibhav Garg and L. Jean Camp. Macroeconomic Analysis of Malware. In Network and Distributed System Security Symposium Extended Abstracts, February 2013.
    Keywords: E-Crime, Economics of Security. [bibtex-key = gargmacroeconomic] [bibtex-entry]

  9. Timothy Kelley and L. Jean Camp. Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections. In The Economics of Information Security and Privacy, pages 157--180. Springer Berlin Heidelberg, 2013.
    Keywords: E-Crime, Network Engineering, Privacy, Economics of Security. [bibtex-key = kelley2013online] [bibtex-entry]

  10. Warigia Bowman and L. Jean Camp. Protecting the Internet from Dictators Technical and Policy Solutions to Ensure Online Freedoms.. Innovation Journal, 18(1), 2013.
    Keywords: Internet Governance. [bibtex-key = bowman2013protecting] [bibtex-entry]

  11. Lesa Lorenzen Huber, Kalpana Shankar, Kelly Caine, Kay Connelly, L. Jean Camp, Beth Ann Walker, and Lisa Borrero. How In-Home Technologies Mediate Caregiving Relationships in Later Life. International Journal of Human-Computer Interaction, 29(7):441--455, 2013.
    Keywords: Aging. [bibtex-key = huber2013home] [bibtex-entry]

  12. Majid Arianezhad, L. Jean Camp, Timothy Kelley, and Douglas Stebila. Comparative eye tracking of experts and novices in web single sign-on. In Proceedings of the third ACM conference on Data and application security and privacy, pages 105--116, 2013. ACM. [bibtex-key = arianezhad2013comparative] [bibtex-entry]

  13. Ty Bross and L. Jean Camp. I just want your anonymized contacts! benefits and education in security & privacy research. In 2013 IEEE Security and Privacy Workshops, pages 1--6, 2013. IEEE. [bibtex-key = bross2013just] [bibtex-entry]

  14. L. Jean Camp. Beyond usability: Security interactions as risk perceptions. In Workshop on Risk Perception in IT Security and Privacy, Newcastle, UK. http://citeseerx. ist. psu. edu/viewdoc/download, 2013. [bibtex-key = camp2013beyond] [bibtex-entry]

  15. Vaibhav Garg and L. Jean Camp. Ex ante vs. ex post: Economically efficient sanctioning regimes for online risks. In , 2013. TPRC. [bibtex-key = garg2013ex] [bibtex-entry]

  16. Aarathi Prasad, Ronald Peterson, Shrirang Mare, Jacob Sorber, Kolin Paul, and David Kotz. Provenance framework for mHealth. In Proceedings of the Workshop on Networked Healthcare Technology (NetHealth), January 2013.
    Keywords: ists, mhealth, privacy, project-tish, security, wearable. [bibtex-key = prasad:nethealth13] [bibtex-entry]

2012 (28)
  1. Zheng Dong, Vaibhav Garg, L. Jean Camp, and Apu Kapadia. Pools, clubs and security: designing for a party not a person. In Proceedings of the 2012 New Security Paradigms Workshop, pages 77--86, September 2012. ACM.
    Keywords: Peer Production, Crowdsourcing of Security, Economics of Security. [bibtex-key = dong2012pools] [bibtex-entry]

  2. Zheng Dong and L. Jean Camp. Peersec: Towards peer production and crowdsourcing for enhanced security. In The 7th USENIX Workshop on Hot Topics in Security (HotSec), August 2012.
    Keywords: Peer Production, Crowdsourcing of Security, Economics of Security. [bibtex-key = dong2012peersec] [bibtex-entry]

  3. Vaibhav Garg, L. Jean Camp, Katherine Connelly, and Lesa Lorenzen-Huber. Risk communication design: video vs. text. In International Symposium on Privacy Enhancing Technologies Symposium, pages 279--298, July 2012. Springer Berlin Heidelberg.
    Keywords: Mental Models, Aging. [bibtex-key = garg2012risk] [bibtex-entry]

  4. Jim Blythe and L. Jean Camp. Implementing Mental Models. In Security and Privacy Workshops (SPW), 2012 IEEE Symposium on, pages 86--90, May 2012. IEEE.
    Keywords: Mental Models. [bibtex-key = blythe2012implementing] [bibtex-entry]

  5. Cory Cornelius, Zachary Marois, Jacob Sorber, Ron Peterson, Shrirang Mare, and David Kotz. Passive Biometrics for Pervasive Wearable Devices (Poster paper). In Proceedings of the Workshop on Mobile Computing Systems and Applications (HotMobile), February 2012.
    Keywords: authentication, ists, poster, project-tish, security, sensors, wearable. [bibtex-key = cornelius:biometrics-poster] [bibtex-entry]

  6. Jacob Sorber, Minho Shin, Ronald Peterson, Cory Cornelius, Shrirang Mare, Aarathi Prasad, Zachary Marois, Emma Smithayer, and David Kotz. An Amulet for Trustworthy Wearable mHealth. In Proceedings of the Workshop on Mobile Computing Systems and Applications (HotMobile), February 2012.
    Keywords: ists, mhealth, privacy, project-amulet, security, sensors, wearable. [bibtex-key = sorber:amulet] [bibtex-entry]

  7. Alessandro Armando, Hilarie Orman, Terry Benzel, L. Jean Camp, Bruno Crispo, Grit Denker, Eduard Hovy, Alefiya Hussain, Daniela Oliveira, and Pierangela Samarati. WSCS 2012. 2012. [bibtex-key = armando2012wscs] [bibtex-entry]

  8. Jim Blyth, Sven Dietrich, and L. Jean Camp. Proceedings of the 16th international conference on Financial Cryptography and Data Security. Springer-Verlag, 2012. [bibtex-key = blyth2012proceedings] [bibtex-entry]

  9. L. Jean Camp and M Eric Johnson. Defeating the Greatest Masquerade. The Economics of Financial and Medical Identity Theft, pp 31--39, 2012.
    Note: Springer US. [bibtex-key = camp2012defeating] [bibtex-entry]

  10. L. Jean Camp and M Eric Johnson. Identity Theft. The Economics of Financial and Medical Identity Theft, pp 17--30, 2012.
    Note: Springer US. [bibtex-key = camp2012identity] [bibtex-entry]

  11. L. Jean Camp and M Eric Johnson. Security and Privacy as Market Failures. The Economics of Financial and Medical Identity Theft, pp 53--60, 2012.
    Note: Springer US. [bibtex-key = camp2012security] [bibtex-entry]

  12. Vaibhav Garg and L. Jean Camp. End User Perception of Online Risk Under Uncertainty. Hawaii International Conference On System Sciences, (Manoa, HI), pp 13--16, January 2012.
    Keywords: Mental Models. [bibtex-key = garg2012enduser] [bibtex-entry]

  13. Vaibhav Garg and L. Jean Camp. Gandhigiri in cyberspace: a novel approach to information ethics. ACM SIGCAS Computers and Society, 42(1):9--20, 2012.
    Keywords: Internet Governance. [bibtex-key = garg2012gandhigiri] [bibtex-entry]

  14. Vaibhav Garg, Chris Kanich, and L. Jean Camp. Analysis of ecrime in Crowd-sourced Labor Markets: Mechanical Turk vs. Freelancer. at WEIS, 2012.
    Keywords: E-Crime. [bibtex-key = garg2012analysis] [bibtex-entry]

  15. Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Melanie Volkamer, and Mike Reiter. Proceedings of the 5th international conference on Trust and Trustworthy Computing. Springer-Verlag, 2012. [bibtex-key = katzenbeisser2012proceedings] [bibtex-entry]

  16. Debin Liu, Ninghui Li, XiaoFeng Wang, and L. Jean Camp. Beyond Risk-Based Access Control: Towards Incentive-Based Access Control. Financial Cryptography and Data Security, pp 102--112, 2012.
    Note: Springer Berlin/Heidelberg.
    Keywords: Insider Threat. [bibtex-key = liu2012beyond] [bibtex-entry]

  17. Greg Norcie, Kelly Caine, and L. Jean Camp. Torpid: Delay and Difficult in the Tor Bundle. 2012. [bibtex-key = norcietorpid] [bibtex-entry]

  18. Andrew S Patrick and L. Jean Camp. Harm Mitigation from the Release of Personal Identity Information. Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards, pp 309-330, 2012.
    Note: Business Science Reference.
    Keywords: Privacy, Economics of Security. [bibtex-key = patrick2012harm] [bibtex-entry]

  19. Kalpana Shankar, L. Jean Camp, Kay Connelly, and Lesa Huber. Aging, Privacy, and Home-Based Computing: Designing for Privacy. Pervasive Computing, IEEE, 11(99):46--54, 2012.
    Keywords: Human-Centered Security. [bibtex-key = shankar2012aging] [bibtex-entry]

  20. K Shankar, L Huber, L. Jean Camp, K Caine, and K Connelly. Finding the older user in home-based computing studies. Gerontechnology, 11(2):305, 2012.
    Keywords: Aging. [bibtex-key = shankar2012finding] [bibtex-entry]

  21. John F Duncan and L. Jean Camp. Conducting an Ethical Study of Web Traffic.. In CSET, 2012. [bibtex-key = duncan2012conducting] [bibtex-entry]

  22. Vaibhav Garg and L. Jean Camp. End user perception of online risk under uncertainty. In System Science (HICSS), 2012 45th Hawaii International Conference on, pages 3278--3287, 2012. IEEE. [bibtex-key = garg2012end] [bibtex-entry]

  23. Timothy Kelley, L. Jean Camp, Suzanne Lien, and Douglas Stebila. Self-identified experts lost on the interwebs: the importance of treating all results as learning experiences. In Proceedings of the 2012 Workshop on Learning from Authoritative Security Experiment Results, pages 47--54, 2012. ACM.
    Keywords: Economics of Security. [bibtex-key = kelley2012self] [bibtex-entry]

  24. Greg Norcie, Kelly Caine, and L. Jean Camp. Eliminating Stop-Points in the Installation and Use of Anonymity Systems: a Usability Evaluation of the Tor Browser Bundle. In 5th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETS), 2012. [bibtex-key = norcie2012eliminating] [bibtex-entry]

  25. Bilal Shebaro, Salmin Sultana, Shakthidhar Reddy Reddy Gopavaram, and Elisa Bertino. Demonstrating a lightweight data provenance for sensor networks. In Proceedings of the 2012 ACM conference on Computer and communications security, pages 1022--1024, 2012. ACM. [bibtex-key = sgopavar2012demonstrating] [bibtex-entry]

  26. Jim Blythe, Sven Dietrich, and L. Jean Camp. Financial Cryptography and Data Security: FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers. Springer, 2012. [bibtex-key = blythe2012financial] [bibtex-entry]

  27. L. Jean Camp and M Eric Johnson. The Economics of Financial and Medical Identity Theft. Springer, 2012. [bibtex-key = camp2012economics] [bibtex-entry]

  28. Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Melanie Volkamer, Mike Reiter, and Xinwen Zhang. Trust and Trustworthy Computing: 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings. Springer, 2012. [bibtex-key = katzenbeisser2012trust] [bibtex-entry]

2011 (19)
  1. Vaibhav Garg, Nathaniel Husted, and L. Jean Camp. The smuggling theory approach to organized digital crime. In eCrime Researchers Summit (eCrime), 2011, pages 1--7, November 2011. IEEE.
    Keywords: E-Crime, Economics of Security. [bibtex-key = garg2011smuggling] [bibtex-entry]

  2. Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, and David Kotz. Adapt-lite: Privacy-aware, Secure, and Efficient mHealth Sensing. In Proceedings of the Workshop on Privacy in the Electronic Society (WPES), October 2011.
    Keywords: ists, mhealth, privacy, project-tish, security, wearable, wifi. [bibtex-key = mare:hns-w] [bibtex-entry]

  3. Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, and David Kotz. Hide-n-Sense: Privacy-aware secure mHealth sensing. Technical report TR2011-702, Dartmouth Computer Science, September 2011.
    Keywords: ignore, ists, mhealth, privacy, project-tish, security, wearable, wifi. [bibtex-key = mare:hns-tr] [bibtex-entry]

  4. Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, and David Kotz. Adaptive security and privacy for mHealth sensing. In Proceedings of the USENIX Workshop on Health Security (HealthSec), August 2011.
    Note: Short paper.
    Keywords: ists, mhealth, position, privacy, project-tish, security, wearable, wifi. [bibtex-key = mare11-adaptlite] [bibtex-entry]

  5. Vaibhav Garg and L. Jean Camp. Heuristics and Biases: Implications for Security Design. IEEE Technology & Society, March 2011.
    Note: IEEE.
    Keywords: Mental Models. [bibtex-key = garg2011heuristics] [bibtex-entry]

  6. L. Jean Camp, Kurt Weisman, and Shaun McDermott. Medication Administration And Patient Health Management Strategies, And Systems For Same, Mar # 30 2011.
    Note: US Patent App. 13/075,546. [bibtex-key = camp2011medication] [bibtex-entry]

  7. Jim Blythe, L. Jean Camp, and Vaibhav Garg. Targeted risk communication for computer security. In Proceedings of the 16th international conference on Intelligent user interfaces, pages 295--298, February 2011. ACM.
    Keywords: Mental Models. [bibtex-key = blythe2011targeted] [bibtex-entry]

  8. K. Lorenzen-Huber, L. Boutain, M., Camp, L. Jean, Shankar, K., Connelly. Privacy, Independence, and Relationships: Older Adults’ Perceptions of Home-Based Ubiquitous Technologies. In , pages 232--252. 2011.
    Keywords: Human-Centered Security. [bibtex-key = lorenzen2011] [bibtex-entry]

  9. L. Jean Camp. Reconceptualizing the Role of Security User. Daedalus, 140(4):93--107, 2011.
    Keywords: Human-Centered Security, Peer Production, Crowdsourcing of Security, Economics of Security. [bibtex-key = camp2011reconceptualizing] [bibtex-entry]

  10. L. Jean Camp. Computer security and, versus, or security informatics: keynote address. Journal of Computing Sciences in Colleges, 26(4):113--114, 2011. [bibtex-key = camp2011computer] [bibtex-entry]

  11. L. Jean Camp and Kalpana Shankar. Constructing the Older User in Home-Based Ubiquitous Computing. The Social Impact of Social Computing, pp 110, 2011.
    Note: Sheffield Hallam University.
    Keywords: Aging, Privacy, IoT. [bibtex-key = camp2011constructing] [bibtex-entry]

  12. Zheng Dong and L. Jean Camp. The decreasing marginal value of evaluation network size. ACM SIGCAS Computers and Society, 41(1):23--37, 2011.
    Keywords: Mental Models, Economics of Security. [bibtex-key = dong2011decreasing] [bibtex-entry]

  13. John F Duncan, L. Jean Camp, and William R Hazlewood. The Portal Monitor: A Privacy-Aware Event-Driven. Smart Healthcare Applications and Services: Developments and Practices, pp 219, 2011.
    Note: IGI Global. [bibtex-key = duncan2011portal] [bibtex-entry]

  14. Vaibhav Garg, L. Jean Camp, LM Lorenzen-Huber, and Katherine Connelly. Designing risk communication for older adults. Proceedings of Ethicomp, Sheffield, UK, 2011. [bibtex-key = garg2011designing] [bibtex-entry]

  15. Vaibhav Garg, Indiana Univeristy, L. Jean Camp, Lesa Mae Lorenzen-Huber, Kalpana Shankar, Katherine Connelly, and Kelly Caine. Privacy Framework for Older Adults. 2011. [bibtex-key = gargprivacy] [bibtex-entry]

  16. Debin Liu, Ninghui Li, XiaoFeng Wang, and L. Jean Camp. Security Risk Management using Incentives. IEEE Security and Privacy, 2011.
    Note: IEEE Computer Society.
    Keywords: Economics of Security, Insider Threat. [bibtex-key = liu2011security] [bibtex-entry]

  17. Lesa Lorenzen-Huber, Mary Boutain, L. Jean Camp, Kalpana Shankar, and Kay H Connelly. Privacy, Technology, and Aging: A Proposed Framework. Ageing International, 36(2):232--252, 2011. [bibtex-key = lorenzen2011privacy] [bibtex-entry]

  18. Tonya Thompson and L. Jean Camp. Privacy Awareness for the Design of Pervasive Home-Based Technology for Elders. 2011. [bibtex-key = thompsonprivacy] [bibtex-entry]

  19. L Lorenzen Huber, L Borrero, B Walker, K Shankar, K Caine, K Connelly, and L. Jean Camp. HOW OLDER ADULTS USE INFORMATION TECHNOLOGY TO REDUCE CAREGIVER BURDEN. In GERONTOLOGIST, volume 51, pages 18--18, 2011. OXFORD UNIV PRESS INC JOURNALS DEPT, 2001 EVANS RD, CARY, NC 27513 USA. [bibtex-key = huber2011older] [bibtex-entry]

2010 (15)
  1. Shrirang Mare and David Kotz. Is Bluetooth the right technology for mHealth?. In Proceedings of the USENIX Workshop on Health Security (HealthSec), August 2010.
    Note: Position paper.
    Keywords: ists, mhealth, position, project-tish, security. [bibtex-key = mare:healthsec10] [bibtex-entry]

  2. Z. Zimmerman and L. Jean Camp. Elder—friendly Design Effects on Acceptance of Novel Technologies. In , April 2010. Elderly Interaction Design CHI; CHI 2010 Workshop, (Atlanta GA.).
    Keywords: Aging. [bibtex-key = zimmerman2010_aging] [bibtex-entry]

  3. L. Jean Camp. Identity management's misaligned incentives. IEEE Security & Privacy, 8(6):90--94, 2010.
    Note: IEEE. [bibtex-key = camp2010identity] [bibtex-entry]

  4. Nathaniel Husted, Vaibhav Garg, and L. Jean Camp. Organized Digital Crime: The Smuggling Theory Approach (A Short Paper). Available at SSRN 1713372, 2010. [bibtex-key = husted2010organized] [bibtex-entry]

  5. Debin Liu, L. Jean Camp, XiaoFeng Wang, and Lusha Wang. Using Budget-Based Access Control to Manage Operational Risks Caused by Insiders. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 1(1):29--45, 2010.
    Keywords: Economics of Security, Insider Threat. [bibtex-key = liu2010using] [bibtex-entry]

  6. Kelly E Caine, Celine Y Zimmerman, Zachary Schall-Zimmerman, William R Hazlewood, Alexander C Sulgrove, L. Jean Camp, Katherine H Connelly, Lesa L Huber, and Kalpana Shankar. DigiSwitch: design and evaluation of a device for older adults to preserve privacy while monitoring health at home. In Proceedings of the 1st ACM International Health Informatics Symposium, pages 153--162, 2010. ACM.
    Keywords: Aging. [bibtex-key = caine2010digiswitch] [bibtex-entry]

  7. L. Jean Camp, L Lorenzen Huber, and L Borrero. WHAT DO OLDER ADULTS UNDERSTAND ABOUT THEIR PRIVACY RISKS WHILE ONLINE?. In GERONTOLOGIST, volume 50, pages 490--490, 2010. OXFORD UNIV PRESS INC JOURNALS DEPT, 2001 EVANS RD, CARY, NC 27513 USA. [bibtex-key = camp2010older] [bibtex-entry]

  8. L. Jean Camp, Rui Wang, and Xiaoyong Zhou. Managing the last eights: three ways forward for IPv6. In Proceedings of the 2010 Workshop on Governance of Technology, Information and Policies, pages 53--60, 2010. ACM. [bibtex-key = camp2010managing] [bibtex-entry]

  9. Zheng Dong and L. Jean Camp. Policy Proposal: Limit Address Allocation to Extend the Lifetime of IPv4 in the APNIC Region. In Proceedings of the 2010 Workshop on Governance of Technology, Information and Policies, GTIP '10, New York, NY, USA, pages 43--51, 2010. ACM.
    Keywords: Economics of Security. [bibtex-key = dong:2010:ppl:1920320.1920327] [bibtex-entry]

  10. V Gargv and L. Jean Camp. How Safe is Safe Enough: Online Version. In Workshop on Security and Human Behavior, 2010. [bibtex-key = gargv2010safe] [bibtex-entry]

  11. L Lorenzen Huber, L. Jean Camp, K Connelly, K Shankar, K Caine, W Hazlewood, and Z Zimmerman. A PRIVACY FRAMEWORK FOR EVALUATING IN-HOME TECHNOLOGIES. In GERONTOLOGIST, volume 50, pages 455--455, 2010. OXFORD UNIV PRESS INC JOURNALS DEPT, 2001 EVANS RD, CARY, NC 27513 USA. [bibtex-key = huber2010privacy] [bibtex-entry]

  12. Shrirang Mare, David Kotz, and Anurag Kumar. Experimental Validation of Analytical Performance Models for IEEE 802.11 Networks. In Proceedings of the Workshop on Wireless Systems: Advanced Research and Development (WISARD), January 2010.
    Keywords: mobility, project-wifi, wifi. [bibtex-key = mare:models] [bibtex-entry]

  13. Azadeh Nematzadeh and L. Jean Camp. Threat analysis of online health information system. In Proceedings of the 3rd International Conference on PErvasive Technologies Related to Assistive Environments, pages 31, 2010. ACM. [bibtex-key = nematzadeh2010threat] [bibtex-entry]

  14. B Walker, L Lorenzen Huber, and L. Jean Camp. DO THE COSTS OUTWEIGH THE BENEFITS? USING A RESOURCE-ORIENTED PERSPECTIVE TO EVALUATE MOBILE PHONE APPS. In GERONTOLOGIST, volume 50, pages 455--455, 2010. OXFORD UNIV PRESS INC JOURNALS DEPT, 2001 EVANS RD, CARY, NC 27513 USA. [bibtex-key = walker2010costs] [bibtex-entry]

  15. L CAMP, John DUNCAN, and others. PRIVACY-ENHANCED EVENT-DRIVEN MONITORING SYSTEM AND METHODOLOGIES, Jan # 22 2010.
    Note: WO Patent 2,010,009,361. [bibtex-key = camp2010privacy] [bibtex-entry]

2009 (10)
  1. Debin Liu, XiaoFeng Wang, and L. Jean Camp. Mitigating inadvertent insider threats with incentives. Financial Cryptography and Data Security, pp 1--16, February 2009.
    Keywords: E-Crime. [bibtex-key = liu2009mitigating] [bibtex-entry]

  2. Farzaneh Asgharpour, Alex Tsow, Preeti Hariharan, and L. Jean Camp. A Usability Study on the Net Trust Anti-Fraud Toolbar. 2009. [bibtex-key = asgharpour2009usability] [bibtex-entry]

  3. L. Jean Camp. Mental models of privacy and security. Technology and Society Magazine, IEEE, 28(3):37--46, 2009.
    Keywords: Human-Centered Security, Mental Models. [bibtex-key = camp2009mental] [bibtex-entry]

  4. L. Jean Camp. Power and Security in the Information Age. Routledge, 2009. [bibtex-key = camp2009power] [bibtex-entry]

  5. Camilo Viecco and L. Jean Camp. A risk based approach to limit the effects of covert channels for internet sensor data aggregators for sensor privacy. Trust Management III, pp 234--251, 2009.
    Note: Springer. [bibtex-key = viecco2009risk] [bibtex-entry]

  6. L. Jean Camp. Design for trust in ambient and ubiquitous computing. In International Conference on Autonomic and Trusted Computing, pages 1--1, 2009. Springer Berlin Heidelberg. [bibtex-key = camp2009design] [bibtex-entry]

  7. L. Jean Camp. Hardening the Network from the Friend Within. In Information Security and Privacy, pages 249--249, 2009. Springer.
    Keywords: Insider Threat. [bibtex-key = camp2009hardening] [bibtex-entry]

  8. John Duncan, L. Jean Camp, and William R Hazelwood. The portal monitor: a privacy-enhanced event-driven system for elder care. In Proceedings of the 4th International Conference on Persuasive Technology, pages 36, 2009. ACM. [bibtex-key = duncan2009portal] [bibtex-entry]

  9. L. Jean Camp, Lorrie Cranor, Nick Feamster, Joan Feigenbaum, Stephanie Forrest, Dave Kotz, Wenke Lee, Patrick Lincoln, Vern Paxson, Mike Reiter, and others. Data for cybersecurity research: Process and wish list. Academic Press, 2009. [bibtex-key = camp2009data] [bibtex-entry]

  10. L. Jean Camp, Rui Wang, and Xiaoyong Zhou. Policy proposal: Limit the address allocation to extend the lifetime of ipv4. ARIN, 2009.
    Keywords: Network Engineering. [bibtex-key = camp2009policy] [bibtex-entry]

2008 (7)
  1. Views from Embeds, Hillary Elmore, L. Jean Camp, and Brandon Stephens. Diffusion and Adoption of IPv6 in the ARIN Region. September 2008.
    Keywords: Economics of Security, Network Engineering. [bibtex-key = fromdiffusion] [bibtex-entry]

  2. Hillary Elmore, L. Jean Camp, and Brandon Stephens. Diffusion and Adoption of IPv6 in the United States.. In WEIS, September 2008.
    Keywords: Network Engineering. [bibtex-key = elmore2008diffusion] [bibtex-entry]

  3. L. Jean Camp, Allan Friedman, and Alla Genkina. Embedding Trust via Social Context in Virtual Spa-ces, July 2008. [bibtex-key = camp2008embedding] [bibtex-entry]

  4. L. Jean Camp. A Review of Security and Human Behaviors. Available at SSRN 1156180, 2008. [bibtex-key = camp2008review] [bibtex-entry]

  5. L. Jean Camp and Kay Connelly. Beyond consent: privacy in ubiquitous computing (Ubicomp). Digital privacy: Theory, technologies, and practices, pp 327--343, 2008. [bibtex-key = camp2008beyond] [bibtex-entry]

  6. Debin Liu, XiaoFeng Wang, and L. Jean Camp. Game-theoretic modeling and analysis of insider threats. International Journal of Critical Infrastructure Protection, 1:75--80, 2008.
    Note: Elsevier.
    Keywords: Economics of Security, Insider Threat. [bibtex-key = liu2008game] [bibtex-entry]

  7. Camilo Viecco and L. Jean Camp. a life or death infosec subversion. IEEE Security & Privacy, 6(5):74--76, 2008.
    Note: IEEE. [bibtex-key = viecco2008life] [bibtex-entry]

2007 (12)
  1. DongInn Kim. OSCAR 5.1 on PlayStation 3. Presentation at Super Computing Conference (SC 2007), Reno, Nevada, October 2007.
    Keywords: OSCAR, high performance computing, cluster. [bibtex-key = dikim08:oscar_presentation] [bibtex-entry]

  2. Kay Connelly and L. Jean Camp. Beyond Consent: Privacy in Ubiquitous Computing (Ubicomp). In Digital Privacy: Theory, Technologies and Practices eds, pages 332--348. Auerbach Publications, 2007.
    Keywords: Aging, Human-Centered Computing, user studies, Privacy, IoT. [bibtex-key = connelly2007beyond] [bibtex-entry]

  3. Sabrina De Capitani di Vimercati, Stefanos Gritzalis, Costas Lambrinoudakis, Alessandro Acquisti, L. Jean Camp, and Kay Connelly. Beyond Consent: Systematic Design for Privacy in Ubicomp. In Digital Privacy: Theory, Technologies, and Practices, pages 327--343. Auerbach Publications, 2007.
    Keywords: Aging. [bibtex-key = vimercati2007beyond] [bibtex-entry]

  4. Farzeneh Asgapour, Debin Liu, and L. Jean Camp. Mental Models of Computer Security Risks. Financial Cryptography and Data Security Lecture Notes in Computer Science, 4886:367--377, 2007.
    Note: Usable Security 07.
    Keywords: Mental Models, Human-Centered Security, Economics of Security. [bibtex-key = jean2007mental] [bibtex-entry]

  5. Farzaneh Asgharpour, Debin Liu, and L. Jean Camp. Mental models of security risks. Financial Cryptography and Data Security, pp 367--377, 2007.
    Note: Springer. [bibtex-key = asgharpour2007mental] [bibtex-entry]

  6. L. Jean Camp, Farzaneh Asgharpour, Debin Liu, and IN Bloomington. Experimental evaluations of expert and non-expert computer users’ mental models of security risks. Proceedings of WEIS 2007, 2007. [bibtex-key = camp2007experimental] [bibtex-entry]

  7. L. Jean Camp. Reliable, Usable Signaling to Defeat Masquerade Attacks. ISJLP, 3:211, 2007.
    Note: HeinOnline.
    Keywords: Economics of Security. [bibtex-key = camp2007reliable] [bibtex-entry]

  8. L. Jean Camp. Security and Usability [Guest Editor's Introduction]. Technology and Society Magazine, IEEE, 26(1):3--24, 2007. [bibtex-key = camp2007security] [bibtex-entry]

  9. Alla Genkina and L. Jean Camp. Social networks. Phishing and countermeasures: Understanding the increasing problem of electronic identity theft, M. Jakobsson and S. Myers, Eds. Hoboken: John Wiley & Sons, pp 523--550, 2007.
    Note: Wiley Online Library.
    Keywords: Phishing. [bibtex-key = genkina2007social] [bibtex-entry]

  10. Alex Tsow, Camilo Viecco, and L. Jean Camp. Privacy-aware architecture for sharing web histories. IBM Systems Journal, 3:5--13, 2007.
    Keywords: Economics of Security. [bibtex-key = tsow2007privacy] [bibtex-entry]

  11. Preeti Hariharan, Farzaneh Asgharpour, and L. Jean Camp. Nettrust—recommendation system for embedding trust in a virtual realm. In Proceedings of the ACM Conference on Recommender Systems, 2007. Citeseer. [bibtex-key = hariharan2007nettrust] [bibtex-entry]

  12. L. Jean Camp. Economics of identity theft: Avoidance, causes and possible cures. Springer, 2007. [bibtex-key = camp2007economics] [bibtex-entry]

2006 (16)
  1. L. Jean Camp. Mental Models of Privacy and Security. IEEE Technology & Society, Vol 28 (3) 37-46, August 2006.
    Keywords: Mental Models, Net Trust. [bibtex-key = jean2006mental] [bibtex-entry]

  2. Debin Liu and L. Jean Camp. Proof of work can work. In Fifth Workshop on the Economics of Information Security, June 2006.
    Keywords: E-Crime, Economics of Security. [bibtex-key = liu2006proof] [bibtex-entry]

  3. L. Jean Camp, Cathleen McGrath, and Alla Genkina. Security and Morality: A Tale of User Deceit. In , May 2006. Models of Trust for the Web MTW'06.
    Keywords: Mental Models, Human-Centered Computing, user studies. [bibtex-key = camp2006human] [bibtex-entry]

  4. DongInn Kim, Jeffrey M. Squyres, and Andrew Lumsdaine. The Introduction of the OSCAR Database API (ODA). In Proceedings of the 20th International Symposium on High-Performance Computing in an Advanced Collaborative Environment (HPCS'06), pages 39, May # 14-17 2006. IEEE Computer Society.
    Note: Session track: 4th Annual OSCAR Symposium (OSCAR'06).
    Keywords: OSCAR, high performance computing, cluster. [bibtex-key = kim:oda:oscar06] [bibtex-entry]

  5. L. Jean Camp and Alla Genkina. Social Networks. In Phishing and Countermeasures, pages 523--550. Wiley, 2006.
    Keywords: Peer Production, Crowdsourcing of Security, Net Trust. [bibtex-key = camp2006social] [bibtex-entry]

  6. L. Jean Camp and others. When Proof of Work Works. 2006. [bibtex-key = camp2006proof] [bibtex-entry]

  7. L. Jean Camp. Reliable Usable Signals to Prevent Masquerade Attacks. Available at SSRN 894973, 2006. [bibtex-key = camp2006reliable] [bibtex-entry]

  8. L. Jean Camp, Kalpana Shankar, and Kay Connelly. Systematic Design for Privacy in Ubicomp. Available at SSRN 889444, 2006. [bibtex-key = camp2006systematic] [bibtex-entry]

  9. L. Jean Camp. Varieties of software and their implications for effective democratic government. Proceedings of the British Academy, Vol. 135, pp. 183-185, 2006, 2006.
    Keywords: Internet Governance. [bibtex-key = camp2006varieties] [bibtex-entry]

  10. Alla Genkina, L. Jean Camp, and IN Bloomington. Countermeasures: Social Networks. 2006. [bibtex-key = genkinacountermeasures] [bibtex-entry]

  11. Suzanne Lien, Timothy Kelley, and L. Jean Camp. Expert and Non-expert Viewing Patterns When Seeking Security Cues. 2006. [bibtex-key = lienexpert] [bibtex-entry]

  12. Debin Liu and L. Jean Camp. Abstract and overview proof of work can work. 2006. [bibtex-key = liu2006abstract] [bibtex-entry]

  13. Ross Anderson, Alessandro Acquisti, L. Jean Camp, Larry Gordon, Marty Loeb, Andrew Odlyzko, Stuart Schechter, Bruce Schneier, and Rahul Telang. The Fifth Workshop on the Economics of Information Security (WEIS 2006). In Workshop: June, volume 26, pages 28, 2006. [bibtex-key = anderson2006fifth] [bibtex-entry]

  14. L JEAN CAMP. 1. TRANSPARENCY IN COMPUTER CODE. In Proceedings of the British Academy, volume 135, pages 183--195, 2006. [bibtex-key = camp20061] [bibtex-entry]

  15. L. Jean Camp, Kay Connelly, and Lesa Lorenzen-Huber. Beyond Consent: Implications of Ubicomp for Privacy. In Telecommunications Policy Research Conference, 2006. [bibtex-key = camp2006beyond] [bibtex-entry]

  16. L. Jean Camp, Cathleen McGrath, and Alla Genkina. Security and morality: A tale of user deceit. In Models of Trust for the Web (MTW’06), Edinburgh, Scotland, volume 22, 2006. World Wide Web Conference. [bibtex-key = camp2006security] [bibtex-entry]

2005 (7)
  1. L. Jean Camp and Allan Friedman. Peer Production of Privacy and Security Information. Telecommunications Policy Research Conference, June 2005.
    Keywords: Peer Production, Crowdsourcing of Security, Economics of Security. [bibtex-key = camppeer] [bibtex-entry]

  2. L. Jean Camp, Warigia Bowman, and Allan Friedman. Voting, vote capture & vote counting symposium. In Proceedings of the 2005 national conference on Digital government research, pages 198--199, May 2005. Digital Government Society of North America.
    Keywords: Peer Production, Crowdsourcing of Security. [bibtex-key = camp2005voting] [bibtex-entry]

  3. DongInn Kim, Jeffrey M. Squyres, and Andrew Lumsdaine. Revamping the OSCAR database: A Flexible Approach to Cluster Configuration Data Management. In Ilias Kotsireas and Deborah Stacey, editors, 19th International Symposium on High Performance Computing Systems and Applications, Guelph, Ontario, Canada, pages 326-332, May 2005. IEEE Computer Society.
    Keywords: OSCAR, high performance computing, cluster. [bibtex-key = kim05:_revam_oscar] [bibtex-entry]

  4. L. Jean Camp. The state of economics of information security. ISJLP, 2:189, 2005.
    Keywords: Economics of Security, Governance. [bibtex-key = camp2005state] [bibtex-entry]

  5. Allan Friedman and L. Jean Camp. Peer-to-peer security. The Handbook of Information Security. J. Wiley&Sons, 2005.
    Note: Citeseer. [bibtex-key = friedman2005peer] [bibtex-entry]

  6. Alla Genkina and L. Jean Camp. Re-embedding existing social networks into online experiences to aid in trust assessment. Available at SSRN 707139, 2005. [bibtex-key = genkina2005re] [bibtex-entry]

  7. L. Jean Camp, Kay Connelly, and Kalpana Shankar. Design for Privacy: Towards a Methodological Approach to Trustworthy Ubicomp Design. In Proceedings of ETHICOMP, pages 12--14, 2005. [bibtex-key = camp2005design] [bibtex-entry]

2004 (12)
  1. L. Jean Camp and Allan Friedman. Peer Patching--Rapid Response in Distributed Systems. In 24th Army Science Conference, December 2004.
    Keywords: Peer Production, Crowdsourcing of Security. [bibtex-key = camp2004peer] [bibtex-entry]

  2. L. Jean Camp. Economics of Information Security. Springer US, 2004.
    Keywords: E-Crime, Economics of Security. [bibtex-key = camp2004econbook] [bibtex-entry]

  3. L. Jean Camp and Allan Friedman. Security in Peer to Peer Systems. In The Handbook of Information Security. John Wiley & Sons, 2004.
    Keywords: Peer Production, Crowdsourcing of Security. [bibtex-key = camp2004security] [bibtex-entry]

  4. L. Jean Camp and Catherine Wolfram. Pricing security. In Economics of Information Security, pages 17--34. Springer US, 2004.
    Keywords: Economics of Security. [bibtex-key = camp2004pricing] [bibtex-entry]

  5. L. JeanL Camp. Digital identity. IEEE Technology and Society Magazine, 23(3):34--41, 2004.
    Note: IEEE. [bibtex-key = camp2004digital] [bibtex-entry]

  6. L. Jean Camp. Digital Identity. IEEE Technology & Society, 23(3):34--41, 2004.
    Keywords: Human-Centered Security. [bibtex-key = camp2004identity] [bibtex-entry]

  7. L. Jean Camp, Fu-Shoun Mao, and Mridul Chowdhury. Thailand at the crossroads. International Journal of Technology, Policy and Management, 4(2):116--135, 2004.
    Keywords: Internet Governance. [bibtex-key = camp2004thailand] [bibtex-entry]

  8. Rebecca T Mercuri and L. Jean Camp. The code of elections. Communications of the ACM, 47(10):52--57, 2004.
    Note: ACM.
    Keywords: Design for Trust, Human-Centered Security, Governance. [bibtex-key = mercuri2004code] [bibtex-entry]

  9. Charles Vincent and L. Jean Camp. Looking to the Internet for models of governance. Ethics and Information Technology, 6(3):161--173, 2004.
    Keywords: Internet Governance. [bibtex-key = vincent2004looking] [bibtex-entry]

  10. L. Jean Camp and Allan Friedman. Good neighbors can make good fences: A peer-to-peer user security system. In Telecommunications Policy and Research Conference, 2004. [bibtex-key = camp2004good] [bibtex-entry]

  11. L. Jean Camp. Mental models of computer security. In Financial Cryptography, pages 106--111, 2004. Springer Berlin Heidelberg. [bibtex-key = camp2004mental] [bibtex-entry]

  12. L. Jean Camp and Stephen Lewis. Economics of information security. Springer Science & Business Media, 2004. [bibtex-key = camp2004economics] [bibtex-entry]

2003 (11)
  1. L. Jean Camp and Ka-Ping Yee. Human Implications of Technology. Practical Handbook of Internet Computing, ed. M. P. Singh, December 2003.
    Note: CRC Press.
    Keywords: Human-Centered Security. [bibtex-key = camphuman] [bibtex-entry]

  2. L. Jean Camp. First principles of copyright for DRM design. IEEE Internet Computing, 7(3):59--65, 2003.
    Note: IEEE.
    Keywords: Design for Trust, Human-Centered Security. [bibtex-key = camp2003first] [bibtex-entry]

  3. L. Jean Camp. Designing for trust. Trust, Reputation, and Security: Theories and Practice, pp 203--209, 2003.
    Note: Springer.
    Keywords: Design for Trust, Privacy, Human-Centered Security. [bibtex-key = camp2003designing] [bibtex-entry]

  4. L. Jean Camp. Code, coding and coded perspectives. Journal of Information, Communication and Ethics in Society, 1(1):49--60, 2003.
    Keywords: Internet Governance. [bibtex-key = camp2003code] [bibtex-entry]

  5. L. Jean Camp and Carlos A Osorio. Privacy-enhancing technologies for internet commerce. Trust in the Network Economy, pp 317--331, 2003.
    Note: Springer.
    Keywords: E-Crime, Economics of Security, Privacy, Governance. [bibtex-key = camp2003privacy] [bibtex-entry]

  6. L. Jean Camp. Peer-to-Peer Systems. The Internet Encyclopedia, 2003.
    Note: Wiley Online Library.
    Keywords: Design for Trust. [bibtex-key = camp2003peer] [bibtex-entry]

  7. L. Jean Camp. Identity, authentication, and identifiers in digital government. In Technology and Society, 2003. Crime Prevention, Security and Design. ISTAS/CPTED 2003. Proceedings. 2003 International Symposium on, pages 10--13, 2003. IEEE. [bibtex-key = camp2003identity] [bibtex-entry]

  8. L. Jean Camp. Open code for digital government. In Proceedings of the 2003 annual national conference on Digital government research, pages 1--2, 2003. Digital Government Society of North America. [bibtex-key = camp2003open] [bibtex-entry]

  9. Allan Friedman and L. Jean Camp. Making Security Manifest Security and Autonomy for End Users. In , 2003. TPRC.
    Keywords: Mental Models, Human-Centered Security, Economics of Security. [bibtex-key = friedman2003making] [bibtex-entry]

  10. Rebecca N Wright, L. Jean Camp, Ian Goldberg, Ronald L Rivest, and Graham Wood. Privacy tradeoffs: myth or reality?. In Financial Cryptography, pages 147--151, 2003. Springer Berlin Heidelberg. [bibtex-key = wright2003privacy] [bibtex-entry]

  11. L. Jean Camp. Design for Trust, Trust, Reputation and Security: Theories and Practice. Ed. Rino Falcone. Springer-Verlang (Berlin), 2003.
    Keywords: Design for Trust. [bibtex-key = camp2003design] [bibtex-entry]

2002 (6)
  1. Serena Chan and L. Jean Camp. Law enforcement surveillance in the network society. IEEE Technology and Society Magazine, 21(2):22--30, 2002.
    Note: IEEE.
    Keywords: Surveillance, Privacy. [bibtex-key = chan2002law] [bibtex-entry]

  2. Serena Chan and L. Jean Camp. Towards Coherent Regulation of Law Enforcement Surveillance in the Network Society. IEEE Technology and Society Magazine, 21(2):22--30, 2002.
    Keywords: Internet Governance. [bibtex-key = chan2002towards] [bibtex-entry]

  3. Carlos A Osorio and L. Jean Camp. Dimensions for the analysis of conflicts between business and technological models in privacy-enhancing solutions for electronic commerce. Inet 2002, 2002. [bibtex-key = osorio2002dimensions] [bibtex-entry]

  4. Serena Syme and L. Jean Camp. The governance of code: Open land vs. UCITA land. ACM SIGCAS Computers and Society, 32(3):2, 2002. [bibtex-key = syme2002governance] [bibtex-entry]

  5. L. Jean Camp. DRM: doesn't really mean digital copyright management. In Proceedings of the 9th ACM conference on Computer and Communications Security, pages 78--87, 2002. ACM.
    Keywords: Design for Trust, Privacy, Human-Centered Security. [bibtex-key = camp2002drm] [bibtex-entry]

  6. L. Jean Camp. Marketplace incentives to prevent piracy: an incentive for security?. In Presentation at Workshop on Information Security Economics, UC-Berkeley, 2002. [bibtex-key = camp2002marketplace] [bibtex-entry]

2001 (7)
  1. L. Jean Camp, Helen Nissenbaum, and Cathleen McGrath. Trust: A collision of paradigms. In International Conference on Financial Cryptography, pages 91--105, October 2001. Springer Berlin Heidelberg.
    Keywords: Design for Trust, Human-Centered Security, PKI. [bibtex-key = camp2001trust] [bibtex-entry]

  2. L. Jean Camp. The Shape of the Network. August 2001.
    Keywords: Design for Trust, Internet Governance, Gender Online. [bibtex-key = campshape] [bibtex-entry]

  3. L. Jean Camp. An atomicity-generating protocol for anonymous currencies. IEEE Transactions on Software Engineering, 27(3):272--278, March 2001.
    Keywords: Network Engineering, Privacy. [bibtex-key = camp2001atomicity] [bibtex-entry]

  4. L. Jean Camp and Marvin Sirbu. Method for certifying delivery of secure electronic transactions, 1) 2001.
    Note: US Patent 6,317,729.
    Keywords: Network Engineering. [bibtex-key = camp2001method] [bibtex-entry]

  5. L. Jean Camp and Brian L Anderson. Deregulating the local loop: the telecommunications regulation path less chosen as taken by Bangladesh. International Journal of Technology, Policy and Management, 1(1):100--114, 2001.
    Keywords: Internet Governance. [bibtex-key = camp2001deregulating] [bibtex-entry]

  6. L. Jean Camp and Serena Syme. Code as Embedded Speech, Machine, and Service. Journal of Information, Law and Technology, 2001(2), 2001.
    Keywords: Internet Governance. [bibtex-key = camp2001code] [bibtex-entry]

  7. L. Jean Camp and Carolyn Gideon. Limits To Certainty in QoS Pricing and Bandwidth. In w: Proc. of the 29th Research Conference on Communication, Information and Internet Policy, 2001. [bibtex-key = camp2001limits] [bibtex-entry]

2000 (10)
  1. L. Jean Camp. Trust & Risk in Internet Commerce. MIT Press, December 2000.
    Keywords: Human-Centered Security, Economics of Security. [bibtex-key = camp2000book] [bibtex-entry]

  2. L. Jean Camp, Justin D Tygar, and Michael R Harkavy. Anonymous certified delivery, June 2000.
    Note: US Patent 6,076,078.
    Keywords: Economics of Security, Network Engineering. [bibtex-key = camp2000anonymous] [bibtex-entry]

  3. L. Jean Camp. The Post-Convergence Consumer. In Creative Destruction, pages 213--228. MIT Press, 2000.
    Keywords: Internet Governance. [bibtex-key = camp2000post] [bibtex-entry]

  4. L. Jean Camp and YT Chien. The internet as public space: concepts, issues, and implications in public policy. ACM SIGCAS Computers and Society, 30(3):13--19, 2000. [bibtex-key = camp2000internet] [bibtex-entry]

  5. L. Jean Camp and Rose P Tsang. Universal service in a ubiquitous digital network. Ethics and Information Technology, 2(4):211--221, 2000.
    Keywords: Network Engineering, Economics of Security, Governance. [bibtex-key = camp2000universal] [bibtex-entry]

  6. L. Jean Camp. The world in 2010: many new entrants. info, 2(2):167--185, 2000.
    Note: MCB UP Ltd. [bibtex-key = camp2000world] [bibtex-entry]

  7. Alan McAdams, L. Jean Camp, and Shastri Divakaruni. The evolution of US telecommunications infrastructure. info, 2(2):107--110, 2000.
    Note: MCB UP Ltd. [bibtex-key = mcadams2000evolution] [bibtex-entry]

  8. L. Jean Camp. Computer security when data= life. In Information Technology Applications in Biomedicine, 2000. Proceedings. 2000 IEEE EMBS International Conference on, pages 3--3, 2000. IEEE. [bibtex-key = camp2000computer] [bibtex-entry]

  9. L. Jean Camp and C Gideon. Certainty in bandwidth or price. In Proceeding of the 29th Research Conference on Communication, Information and Internet Policy, Washington, DC, 2000. [bibtex-key = camp2000certainty] [bibtex-entry]

  10. L. Jean Camp and Catherine Wolfram. Pricing security. In Proceedings of the CERT Information Survivability Workshop, pages 31--39, 2000.
    Keywords: Economics of Security, Methodology. [bibtex-key = camp2000pricing] [bibtex-entry]

1999 (3)
  1. L. Jean Camp. Community Considered. In democracy.com? Governance in a Networked World. Hollis Publishin, 1999.
    Keywords: Internet Governance. [bibtex-key = camp1999community] [bibtex-entry]

  2. L. Jean Camp. Web security and privacy: An American perspective. The Information Society, 15(4):249--256, 1999.
    Note: Taylor & Francis.
    Keywords: Design for Trust, Privacy. [bibtex-key = camp1999web] [bibtex-entry]

  3. L. Jean Camp and Brian L Anderson. Grameen phone: empowering the poor through connectivity. Information Impacts Magazine, pp 13--27, 1999. [bibtex-key = camp1999grameen] [bibtex-entry]

1998 (1)
  1. L. Jean Camp and JFK Street Cambridge. Democratic Implications of Internet Privacy. Design for values: ethnical, societal & policy dimensions of information technology, February 28-March 1, 1998, pp 7, 1998.
    Note: DIMACS.
    Keywords: Internet Governance. [bibtex-key = camp1998democratic] [bibtex-entry]

1997 (7)
  1. David A Evensky, Ann C Gentile, L. Jean Camp, and Robert C Armstrong. Lilith: Scalable execution of user code for distributed computing. In High Performance Distributed Computing, 1997. Proceedings. The Sixth IEEE International Symposium on, pages 305--314, August 1997. IEEE.
    Keywords: Network Engineering. [bibtex-key = evensky1997lilith] [bibtex-entry]

  2. L. Jean Camp and Marvin Sirbu. Critical issues in internet commerce. IEEE Communications Magazine, 35(5):58--62, May 1997.
    Keywords: Human-Centered Security. [bibtex-key = camp1997critical] [bibtex-entry]

  3. L. Jean Camp and D.A. Evensky. Survivability & Trust. In , pages 12--14, May 1997. Research Directions for the Next Generation Internet, Washington, DC.
    Keywords: Design for Trust, Network Engineering. [bibtex-key = camp1997trust] [bibtex-entry]

  4. L. Painton, T. Gaylor, L. Jean Camp, C. Phillips, and G. Wyss. Risk—based characterization of network vulnerability. CERT Information Survivability Workshop, February 1997.
    Keywords: Network Engineering. [bibtex-key = painton1997_presentation] [bibtex-entry]

  5. L. Jean Camp and Donna M Riley. Bedrooms, Barrooms, and Boardrooms on the Interner. In Interconnection and the Internet: selected papers from the 1996 Telecommunications Policy Research Conference, pages 205, 1997. Lawrence Erlbaum.
    Keywords: Gender Online. [bibtex-key = camp1997bedrooms] [bibtex-entry]

  6. L. Jean Camp. Opportunities, Options, Obstacles for Payment in Internet Commerce. In EDI FORUM-OAK PARK-, volume 10, pages 19--32, 1997. THE EDI GROUP, LTD.. [bibtex-key = camp1997opportunities] [bibtex-entry]

  7. RC Armstrong, L. Jean Camp, DA Evensky, and AC Gentile. Lilith: A scalable secure tool for massively parallel distributed computing. Technical report, Sandia National Labs., Albuquerque, NM (United States), 1997. [bibtex-key = armstrong1997lilith] [bibtex-entry]

1996 (3)
  1. L. Jean Camp. We are geeks, and we are not guys: The systers mailing list. Wired women: Gender and new realities in cyberspace, pp 114--125, 1996.
    Keywords: Gender Online. [bibtex-key = camp1996we] [bibtex-entry]

  2. L. Jean Camp. Anonymous atomic transactions. Technical report, DTIC Document, 1996. [bibtex-key = camp1996anonymous] [bibtex-entry]

  3. JD Tygar, Bennet Yee, L. Jean Camp, and Michael Harkavy. Anonymous Atomic Transactions. CARNEGIE-MELLON UNIV PITTSBURGH PA DEPT OF COMPUTER SCIENCE, 1996. [bibtex-key = tygar1996anonymous] [bibtex-entry]

1995 (2)
  1. L. Jean Camp, Marvin Sirbu, and JD Tygar. Token and notational money in electronic commerce. In Proceedings of the First USENIX Workshop in Electronic Commerce, pages 1--12, July 1995.
    Keywords: Economics of Security, Network Engineering. [bibtex-key = camp1995token] [bibtex-entry]

  2. L. Jean Camp and D Riley. Women, children, animals and the like: Protecting an unwilling electronic populace. In Proceedings of the Fifth Conference on Computers, Freedom and Privacy, pages 120--139, 1995.
    Keywords: Internet Governance, Gender Online. [bibtex-key = camp1995women] [bibtex-entry]

1994 (4)
  1. L. Jean Camp. Privacy: from abstraction to applications. ACM SIGCAS Computers and Society, 24(3):8--15, September 1994.
    Keywords: Human-Centered Security. [bibtex-key = camp1994privacy] [bibtex-entry]

  2. L. Jean Camp and JD Tygar. Providing auditing while protecting privacy. The Information Society, 10(1):59--71, March 1994.
    Keywords: Human-Centered Security. [bibtex-key = camp1994providing] [bibtex-entry]

  3. L. Jean Camp. Cryptography policy needs another look. IEEE Spectrum, 31(6):15--16, 1994.
    Note: IEEE Press. [bibtex-key = camp1994cryptography] [bibtex-entry]

  4. L. Jean Camp, Rohini Sharma, and Michael R Feldman. Guided-wave and free-space optical interconnects for parallel-processing systems: a comparison. Applied optics, 33(26):6168--6180, 1994.
    Note: Optical Society of America. [bibtex-key = camp1994guided] [bibtex-entry]

1993 (1)
  1. L. Jean Camp and Marvin Sirbu. Networking strategy at traveler's insurance. In Proceedings of the 1993 conference on Computer personnel research, pages 450--462, 1993. ACM. [bibtex-key = camp1993networking] [bibtex-entry]


BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Mon Nov 7 18:21:14 2022
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House