[ Publications of year 2021 ]

Articles in journals or book chapters (1)
  1. Hilda Hadan, Skyler Johnson, Katherine Ferro, and L. Jean Camp. Human and Organizational Factors in Public Key Certificate Authority Failures. ACM CCS, 11 2021.
    @Article{ hhadan2021ccs,
    title = {Human and Organizational Factors in Public Key Certificate Authority Failures},
    author = {Hilda Hadan and Skyler Johnson and Katherine Ferro and L. Jean Camp},
    journal = {ACM CCS},
    year = {2021},
    month = {11},
    day = {15} }

Conference publications (10)
  1. Vafa Andalibi, Jayati Dev, DongInn Kim, Eliot Lear, and L Jean Camp. Is Visualization Enough? Evaluating the Efficacy of MUD-Visualizer in Enabling Ease of Deployment for Manufacturer Usage Description (MUD). In Annual Computer Security Applications Conference, pages 337--348, December 2021.
    Keywords: IoT, MUD, MUD-Visualizer.
    @InProceedings{ andalibi2021visualization,
    title = {Is Visualization Enough? Evaluating the Efficacy of MUD-Visualizer in Enabling Ease of Deployment for Manufacturer Usage Description (MUD)},
    author = {Andalibi, Vafa and Dev, Jayati and Kim, DongInn and Lear, Eliot and Camp, L Jean},
    booktitle = {Annual Computer Security Applications Conference},
    keywords = "IoT, MUD, MUD-Visualizer",
    pages = {337--348},
    month = dec,
    year = {2021} }

  2. Ece Gumusel. Preliminary Analysis of Data Subject Right Effectiveness and Blockages in Industry. In In iConference 2022 Proceedings, December 2021.
    Keywords: privacy, information policy, information ethics.
    @InProceedings{ gumusel2021databroker,
    title = {Preliminary Analysis of Data Subject Right Effectiveness and Blockages in Industry},
    author = {Gumusel, Ece},
    booktitle = {In iConference 2022 Proceedings},
    url = {https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3991237},
    month = {December},
    year = {2021},
    keywords = "privacy, information policy, information ethics" }

  3. L Jean Camp, Shakthidhar Gopavaram, Jayati Dev, and Ece Gumusel. Lessons for Labeling from Risk communication. In Workshop and Call for Papers on Cybersecurity Labeling Programs for Consumers: Internet of Things (IoT) Devices and Software, September 2021.
    Keywords: Privacy and Security Labels, IoT.
    @InProceedings{ camp2021lessons,
    title = {Lessons for Labeling from Risk communication},
    author = {Camp, L Jean and Gopavaram, Shakthidhar, and Dev, Jayati and Gumusel, Ece},
    booktitle = {Workshop and Call for Papers on Cybersecurity Labeling Programs for Consumers: Internet of Things (IoT) Devices and Software},
    url = {https://www.nist.gov/system/files/documents/2021/09/03/IndianaUniversity-NIST_Beyond_Privacy_Labels.pdf},
    month = {September},
    year = {2021},
    keywords = "Privacy and Security Labels, IoT" }

  4. Jayati Dev, Shakthidhar Gopavaram, Ece Gumusel, and L Jean Camp. A Consumer-focused Modular Approach to Labeling IoT Devices and Software. In Workshop and Call for Papers on Cybersecurity Labeling Programs for Consumers: Internet of Things (IoT) Devices and Software, September 2021.
    Keywords: Privacy and Security Labels, IoT.
    @InProceedings{ jayati2021modularity,
    title = {{A Consumer-focused Modular Approach to Labeling IoT Devices and Software}},
    author = { Dev, Jayati and Gopavaram, Shakthidhar and Gumusel, Ece and Camp, L Jean},
    booktitle = {Workshop and Call for Papers on Cybersecurity Labeling Programs for Consumers: Internet of Things (IoT) Devices and Software},
    url = {https://www.nist.gov/system/files/documents/2021/09/03/IndianaUniversity-NIST_Lessons_for_Labeling_from_Risk_Communication.pdf},
    month = {September},
    keywords = "Privacy and Security Labels, IoT",
    year = {2021} }

  5. Shakthidhar Gopavaram, Jayati Dev, Ece Gumusel, and L Jean Camp. Going Beyond Labels. In Workshop and Call for Papers on Cybersecurity Labeling Programs for Consumers: Internet of Things (IoT) Devices and Software, September 2021.
    Keywords: Privacy and Security Labels, IoT.
    @InProceedings{ gopavaram2021going,
    title = {Going Beyond Labels},
    author = {Gopavaram, Shakthidhar and Dev, Jayati and Gumusel, Ece and Camp, L Jean},
    booktitle = {Workshop and Call for Papers on Cybersecurity Labeling Programs for Consumers: Internet of Things (IoT) Devices and Software},
    url = {https://www.nist.gov/system/files/documents/2021/09/03/IndianaUniversity-NIST_Lessons_for_Labeling_from_Risk_Communication.pdf},
    month = {September},
    keywords = "Privacy and Security Labels, IoT",
    year = {2021} }

  6. Vafa Andalibi, Jayati Dev, DongInn Kim, Eliot Lear, and Jean Camp. Making Access Control Easy in IoT. In IFIP International Symposium on Human Aspects of Information Security & Assurance, June 2021.
    Keywords: IoT, MUD, MUD-Visualizer.
    @InProceedings{ andalibi2021mudvizuserstudy,
    title = {{Making Access Control Easy in IoT}},
    author = {Vafa Andalibi and Jayati Dev and DongInn Kim and Eliot Lear and Jean Camp},
    booktitle = {IFIP International Symposium on Human Aspects of Information Security & Assurance},
    keywords = "IoT, MUD, MUD-Visualizer",
    year = {2021},
    month = jun }

  7. Shakthidhar Gopavaram, Jayati Dev, Sanchari Das, and L Jean Camp. IoT Marketplace: Willingness-To-Pay vs. Willingness-To-Accept. In Proceedings of the 20th Annual Workshop on the Economics of Information Security (WEIS 2021), June 2021.
    Keywords: IoT, Privacy Labels, Marketplace, Psychological Biases.
    @InProceedings{ gopavaram2021iot,
    title = {IoT Marketplace: Willingness-To-Pay vs. Willingness-To-Accept},
    author = {Gopavaram, Shakthidhar and Dev, Jayati and Das, Sanchari and Camp, L Jean},
    booktitle = {Proceedings of the 20th Annual Workshop on the Economics of Information Security (WEIS 2021)},
    url = {https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3867652},
    doi = {10.2139/ssrn.3867652},
    month = {June},
    year = {2021},
    keywords = "IoT, Privacy Labels, Marketplace, Psychological Biases" }

  8. Vafa Andalibi, Eliot Lear, DongInn Kim, and Jean Camp. On the Analysis of MUD-Files' Interactions, Conflicts, and Configuration Requirements Before Deployment. In 5th EAI International Conference on Safety and Security in Internet of Things, SaSeIoT, May 2021. Springer.
    Keywords: IoT, MUD, MUD-Visualizer.
    @InProceedings{ andalibi2021mudviz,
    title = {{On the Analysis of MUD-Files' Interactions, Conflicts, and Configuration Requirements Before Deployment}},
    author = {Vafa Andalibi and Eliot Lear and DongInn Kim and Jean Camp},
    booktitle = {5th EAI International Conference on Safety and Security in Internet of Things, SaSeIoT},
    publisher = {Springer},
    keywords = "IoT, MUD, MUD-Visualizer",
    year = {2021},
    month = may }

  9. Shakthidhar Gopavaram, Jayati Dev, Marthie Grobler, DongInn Kim, Sanchari Das, and L Jean Camp. Cross-National Study on Phishing Resilience. In Proceedings of the Workshop on Usable Security and Privacy (USEC), May 2021.
    Keywords: Phishing.
    @InProceedings{ gopavaram2021cross,
    title = {Cross-National Study on Phishing Resilience},
    author = {Gopavaram, Shakthidhar and Dev, Jayati and Grobler, Marthie and Kim, DongInn and Das, Sanchari and Camp, L Jean},
    booktitle = {Proceedings of the Workshop on Usable Security and Privacy (USEC)},
    url = {https://www.ndss-symposium.org/wp-content/uploads/usec2021_23017_paper.pdf},
    doi = {10.14722/usec.2021.23017},
    month = {May},
    year = {2021},
    keywords = "Phishing" }

  10. DongInn Kim, Vafa Andalibi, and L Jean Camp. Protecting IoT Devices through Localized Detection of BGP Hijacks for Individual Things. In SafeThings 2021, Oakland, May 2021. IEEE Workshop on the Internet of Safe Things.
    Keywords: Fingerprinting, IoT.
    @InProceedings{ dikim21:bgp_hijacking,
    author = {DongInn Kim and Vafa Andalibi and L Jean Camp},
    title = {Protecting IoT Devices through Localized Detection of BGP Hijacks for Individual Things},
    booktitle = {SafeThings 2021},
    year = 2021,
    address = {Oakland},
    month = {May},
    publisher = {IEEE Workshop on the Internet of Safe Things},
    url = {http://www.usablesecurity.net/projects/IoT/papers/BGP_Hijacking_detection_via_Block_Pi.pdf},
    keywords = "Fingerprinting, IoT",
    institution = {Cisco, NSF} }

Posters and Presentations (7)
  1. Laura Calloway, Lesa Huber, and L. Jean Camp. Privacy and Usability in COVID Enrollment Apps. Poster at GSA Annual Meeting (Gerontological Society of America, 2021), ONLINE, November 2021.
    Keywords: privacy, health.
    @Misc{ lcallowa2021gsa,
    author = {Laura Calloway and Lesa Huber and L. Jean Camp},
    title = {Privacy and Usability in COVID Enrollment Apps},
    howpublished = {Poster at GSA Annual Meeting (Gerontological Society of America, 2021), ONLINE},
    month = {November},
    year = {2021},
    keywords = "privacy, health" }

  2. Laura Calloway. Harm Reduction for Internet of Things Devices. Presentation at Annual Meeting of Society For Social Studies Of Science (4S, 2021), Toronto, CA, Virtual, October 2021.
    Keywords: privacy, health, IoT, surveillance.
    @Misc{ lcallowa20214s,
    author = {Laura Calloway},
    title = {Harm Reduction for Internet of Things Devices},
    howpublished = {Presentation at Annual Meeting of Society For Social Studies Of Science (4S, 2021), Toronto, CA, Virtual},
    url = {https://www.4sonline.org/meeting/},
    month = {October},
    year = {2021},
    keywords = "privacy, health, IoT, surveillance" }

  3. Joshua Streiff. Cybersecurity & You. A Brown Co. Schools Speaker Series, September 2021.
    Keywords: K12.
    @Misc{ streiff2021brownco,
    title = "Cybersecurity & You",
    author = {Streiff, Joshua},
    keywords = {K12},
    year = {2021},
    month = {September},
    howpublished = {A Brown Co. Schools Speaker Series} }

  4. L. Jean Camp Ashley Bochner, Jacob Abbott. Potential Reuse of University Credentials. Poster at the Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021), August 2021.
    Keywords: Passwords, Security, Authentication.
    @Misc{ bochner2021,
    author = {Ashley Bochner, Jacob Abbott, L. Jean Camp},
    title = {Potential Reuse of University Credentials},
    howpublished = {Poster at the Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021)},
    url = {https://www.usenix.org/conference/soups2021/presentation/bochner},
    month = {August},
    year = {2021},
    keywords = "Passwords, Security, Authentication" }

  5. Corey Allen and Joshua Streiff. Sleeping Alone: Detecting and Countering Hidden Cameras in AirBnB Environments. IU GROUPS STEM Poster (IN), July 2021.
    Keywords: IoT.
    @Misc{ allen2021_poster,
    title = "Sleeping Alone: Detecting and Countering Hidden Cameras in AirBnB Environments",
    author = {Allen, Corey and Streiff, Joshua},
    howpublished = {IU GROUPS STEM Poster (IN)},
    month = {July},
    year = {2021},
    keywords = {IoT} }

  6. Joshua Streiff. Finding Alice & Bob: Using BLE to Locate Victims & First Responders in Buildings. IU IDER Poster (IN), July 2021.
    Keywords: IoT.
    @Misc{ streiff2021_poster,
    title = "Finding Alice & Bob: Using BLE to Locate Victims & First Responders in Buildings",
    author = {Streiff, Joshua},
    howpublished = {IU IDER Poster (IN)},
    month = {July},
    year = {2021},
    keywords = {IoT} }

  7. Joshua Streiff. Online Safety For All Ages. Life Lessons 4H Series for High School Students Workshop, June 2021.
    Keywords: K12.
    @Misc{ streiff2021_4h,
    title = "Online Safety For All Ages",
    author = {Streiff, Joshua},
    keywords = {K12},
    year = {2021},
    month = {June},
    howpublished = {Life Lessons 4H Series for High School Students Workshop} }


BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Fri Jan 21 01:00:06 2022
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House