[ Publications about 'Privacy Labels' ]

Articles in journals or book chapters (16)
  1. Marthie Grobler, M.A.P. Chamikara, Jacob Abbott, Surya Nepal, and Cecil Paris. The Importance of Social Identity on Password Formulation. Personal and Ubiquitous Computing, November 2020.
    Keywords: Passwords, Security, Privacy, International, Authentication. [bibtex-entry]

  2. Jayati Dev. Discussing Privacy and Surveillance on Twitter: A Case Study of COVID-19. arXiv preprint arXiv:2006.06815, 2020.
    Keywords: Privacy, Computational Social Science, Social Network Privacy, human factors, surveillance, internet governance. [bibtex-entry]

  3. Jayati Dev, Emilee Rader, and Sameer Patil. Why Johnny Can’t Unsubscribe: Barriers to Stopping Unwanted Email. 2020.
    Keywords: Privacy, Emails, User Study, human factors. [bibtex-entry]

  4. Jayati Dev, Sanchari Das, and Kaushik Srinivasan. Modularity is the Key: A New Approach to Social Media Privacy Policies. 2018.
    Keywords: Privacy, Social Network Privacy, human factors, internet governance. [bibtex-entry]

  5. Sanchari Das, Gianpaolo Russo, Andrew C Dingman, Jayati Dev, Olivia Kenny, and L Jean Camp. A Qualitative Study on Usability and Acceptability of Yubico Security Key. 2017.
    Keywords: Privacy, two-factor authentication, human factors. [bibtex-entry]

  6. Greg Norcie and L. Jean Camp. The Price Of Privacy: An Examination of the Economic Costs of Abstention from Social Networks. 2015 Amsterdam Privacy Conference (APC 2015), October 2015.
    Keywords: Privacy, Peer Production, Crowdsourcing of Security, Internet Governance. [bibtex-entry]

  7. Vaibhav Garg and L. Jean Camp. Cars, Condoms, and Facebook. In Information Security, pages 280--289. Springer International Publishing, 2015.
    Keywords: Mental Models, Human-Centered Security, Privacy. [bibtex-entry]

  8. Timothy Kelley and L. Jean Camp. Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections. In The Economics of Information Security and Privacy, pages 157--180. Springer Berlin Heidelberg, 2013.
    Keywords: E-Crime, Network Engineering, Privacy, Economics of Security. [bibtex-entry]

  9. Andrew S Patrick and L. Jean Camp. Harm Mitigation from the Release of Personal Identity Information. Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards, pp 309-330, 2012.
    Note: Business Science Reference.
    Keywords: Privacy, Economics of Security. [bibtex-entry]

  10. L. Jean Camp and Kalpana Shankar. Constructing the Older User in Home-Based Ubiquitous Computing. The Social Impact of Social Computing, pp 110, 2011.
    Note: Sheffield Hallam University.
    Keywords: Aging, Privacy, IoT. [bibtex-entry]

  11. Kay Connelly and L. Jean Camp. Beyond Consent: Privacy in Ubiquitous Computing (Ubicomp). In Digital Privacy: Theory, Technologies and Practices eds, pages 332--348. Auerbach Publications, 2007.
    Keywords: Aging, Human-Centered Computing, user studies, Privacy, IoT. [bibtex-entry]

  12. L. Jean Camp and Carlos A Osorio. Privacy-enhancing technologies for internet commerce. Trust in the Network Economy, pp 317--331, 2003.
    Note: Springer.
    Keywords: E-Crime, Economics of Security, Privacy, Governance. [bibtex-entry]

  13. L. Jean Camp. Designing for trust. Trust, Reputation, and Security: Theories and Practice, pp 203--209, 2003.
    Note: Springer.
    Keywords: Design for Trust, Privacy, Human-Centered Security. [bibtex-entry]

  14. Serena Chan and L. Jean Camp. Law enforcement surveillance in the network society. IEEE Technology and Society Magazine, 21(2):22--30, 2002.
    Note: IEEE.
    Keywords: Surveillance, Privacy. [bibtex-entry]

  15. L. Jean Camp. An atomicity-generating protocol for anonymous currencies. IEEE Transactions on Software Engineering, 27(3):272--278, March 2001.
    Keywords: Network Engineering, Privacy. [bibtex-entry]

  16. L. Jean Camp. Web security and privacy: An American perspective. The Information Society, 15(4):249--256, 1999.
    Note: Taylor & Francis.
    Keywords: Design for Trust, Privacy. [bibtex-entry]

Conference publications (16)
  1. Ece Gumusel. Preliminary Analysis of Data Subject Right Effectiveness and Blockages in Industry. In , March 2022.
    Keywords: privacy, information policy, information ethics. [bibtex-entry]

  2. Jacob Abbott, Jayati Dev, Donginn Kim, Shakthidhar Gopavaram, Meera Iyer, Shivani Sadam, Shrirang Mare, Tatiana Ringenberg, Vafa Andalibi, and L. Jean Camp. Privacy Lessons Learnt from Deploying an IoT Ecosystem in the Home. In Proceedings of the 2022 European Symposium on Usable Security, EuroUSEC '22, New York, NY, USA, pages 98–110, 2022. Association for Computing Machinery.
    Keywords: Security, user interviews, smart home, IoT, 2FA, privacy. [bibtex-entry]

  3. Shakthidhar Gopavaram, Jayati Dev, Sanchari Das, and L Jean Camp. IoT Marketplace: Willingness-To-Pay vs. Willingness-To-Accept. In Proceedings of the 20th Annual Workshop on the Economics of Information Security (WEIS 2021), June 2021.
    Keywords: IoT, Privacy Labels, Marketplace, Psychological Biases. [bibtex-entry]

  4. Sanchari Das, Jacob Abbott, Shakthidhar Gopavaram, Jim Blythe, and L Jean Camp. User-Centered Risk Communication for Safer Browsing. In Proceedings of the First Asia USEC-Workshop on Usable Security, In Conjunction with the Twenty-Fourth International Conference International Conference on Financial Cryptography and Data Security, 2020.
    Keywords: Phishing, Risk Communication, Privacy, Security. [bibtex-entry]

  5. Jayati Dev, Pablo Moriano, and L Jean Camp. Lessons Learnt from Comparing WhatsApp Privacy Concerns Across Saudi and Indian Populations. In Sixteenth Symposium on Usable Privacy and Security (\{SOUPS\} 2020), pages 81--97, 2020.
    Keywords: Privacy, International, Social Network Privacy, human factors. [bibtex-entry]

  6. Jonathan Schubauer, Anjanette Raymond, and Dhruv Madappa. Over-Priviliged Permission: Using Technology and Design to Create Privacy Compliance. In , June 2019. IACL.
    Keywords: Mobile Privacy, Governance, Privacy. [bibtex-entry]

  7. Jacob Abbott, Novia Nurain Haley MacLeod, Gustave Ekobe, and Sameer Patil. Local Standards for Anonymization Practices in Health, Wellness, Accessibility, and Aging Research at CHI. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019. ACM.
    Keywords: Health, Privacy, Anonymization. [bibtex-entry]

  8. Sanchari Das, Jayati Dev, and Kaushik Srinivasan. Modularity is the Key: A New Approach to Social Media Privacy Policies. In ACM, 2018. MEXIHC 2018.
    Keywords: Privacy, Social Network Privacy, human factors, internet governance. [bibtex-entry]

  9. Jayati Dev, Sanchari Das, and L Jean Camp. Privacy Practices, Preferences, and Compunctions: WhatsApp Users in India. In Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2018), pages 135, 2018. Lulu. com.
    Keywords: Privacy, Cultural, Social Network Privacy, human factors. [bibtex-entry]

  10. Jayati Dev, Sanchari Das, and L Jean Camp. Understanding privacy concerns of whatsapp users in India: poster. In Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, pages 28, 2018. ACM.
    Keywords: Privacy, Cultural, Social Network Privacy, human factors. [bibtex-entry]

  11. Haley MacLeod, Jacob Abbott, and Sameer Patil. Small Data Privacy Protection: An Exploration of the Utility of Anonymized Data of People with Rare Diseases. In Proceedings of the 2017 Workshop on Interactive Systems in Healthcare (WISH’17), 2017.
    Keywords: Privacy, Health, Anonymization. [bibtex-entry]

  12. Aarathi Prasad, Ronald Peterson, Shrirang Mare, Jacob Sorber, Kolin Paul, and David Kotz. Provenance framework for mHealth. In Proceedings of the Workshop on Networked Healthcare Technology (NetHealth), January 2013.
    Keywords: ists, mhealth, privacy, project-tish, security, wearable. [bibtex-entry]

  13. Jacob Sorber, Minho Shin, Ronald Peterson, Cory Cornelius, Shrirang Mare, Aarathi Prasad, Zachary Marois, Emma Smithayer, and David Kotz. An Amulet for Trustworthy Wearable mHealth. In Proceedings of the Workshop on Mobile Computing Systems and Applications (HotMobile), February 2012.
    Keywords: ists, mhealth, privacy, project-amulet, security, sensors, wearable. [bibtex-entry]

  14. Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, and David Kotz. Adapt-lite: Privacy-aware, Secure, and Efficient mHealth Sensing. In Proceedings of the Workshop on Privacy in the Electronic Society (WPES), October 2011.
    Keywords: ists, mhealth, privacy, project-tish, security, wearable, wifi. [bibtex-entry]

  15. Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, and David Kotz. Adaptive security and privacy for mHealth sensing. In Proceedings of the USENIX Workshop on Health Security (HealthSec), August 2011.
    Note: Short paper.
    Keywords: ists, mhealth, position, privacy, project-tish, security, wearable, wifi. [bibtex-entry]

  16. L. Jean Camp. DRM: doesn't really mean digital copyright management. In Proceedings of the 9th ACM conference on Computer and Communications Security, pages 78--87, 2002. ACM.
    Keywords: Design for Trust, Privacy, Human-Centered Security. [bibtex-entry]

Internal reports (1)
  1. Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, and David Kotz. Hide-n-Sense: Privacy-aware secure mHealth sensing. Technical report TR2011-702, Dartmouth Computer Science, September 2011.
    Keywords: ignore, ists, mhealth, privacy, project-tish, security, wearable, wifi. [bibtex-entry]

Posters and Presentations (3)
  1. Laura Calloway, Lesa Huber, and L. Jean Camp. Privacy and Usability in COVID Enrollment Apps. Poster at GSA Annual Meeting (Gerontological Society of America, 2021), ONLINE, November 2021.
    Keywords: privacy, health. [bibtex-entry]

  2. Laura Calloway. Harm Reduction for Internet of Things Devices. Presentation at Annual Meeting of Society For Social Studies Of Science (4S, 2021), Toronto, CA, Virtual, October 2021.
    Keywords: privacy, health, IoT, surveillance. [bibtex-entry]

  3. Laura Calloway. Corporate Infrastructural Expansion as Big Data Surveillance. Presentation at Annual Meeting of Society For Social Studies Of Science (4S, 2019), New Orleans, Louisiana, September 2019.
    Keywords: privacy, policies, governance, surveillance. [bibtex-entry]


BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Mon Nov 7 18:21:17 2022
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House