Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
L. Jean Camp
2010 – today
- 2013
[j18]Lesa Lorenzen-Huber, Kalpana Shankar, Kelly E. Caine, Kay Connelly, L. Jean Camp, Beth Ann Walker, Lisa Borrero: How In-Home Technologies Mediate Caregiving Relationships in Later Life. Int. J. Hum. Comput. Interaction 29(7): 441-455 (2013)
[j17]Vaibhav Garg, L. Jean Camp: Heuristics and Biases: Implications for Security Design. IEEE Technol. Soc. Mag. 32(1): 73-79 (2013)
[c36]Majid Arianezhad, L. Jean Camp, Timothy Kelley, Douglas Stebila: Comparative eye tracking of experts and novices in web single sign-on. CODASPY 2013: 105-116
[c35]
[c34]Kevin Benton, L. Jean Camp, Vaibhav Garg: Studying the effectiveness of android application permissions requests. PerCom Workshops 2013: 291-296
[c33]- 2012
[b3]L. Jean Camp, M. Eric Johnson: The Economics of Financial and Medical Identity Theft. Springer 2012, ISBN 978-1-4614-1917-4, pp. I-XI, 1-166
[j16]Kalpana Shankar, L. Jean Camp, Kay Connelly, Lesa L. Huber: Aging, Privacy, and Home-Based Computing: Developing a Design Framework. IEEE Pervasive Computing 11(4): 46-54 (2012)
[c32]Vaibhav Garg, L. Jean Camp: End User Perception of Online Risk under Uncertainty. HICSS 2012: 3278-3287
[c31]Zheng Dong, Vaibhav Garg, L. Jean Camp, Apu Kapadia: Pools, clubs and security: designing for a party not a person. NSPW 2012: 77-86
[c30]Vaibhav Garg, L. Jean Camp, Katherine H. Connelly, Lesa Lorenzen-Huber: Risk Communication Design: Video vs. Text. Privacy Enhancing Technologies 2012: 279-298
[c29]Jim Blythe, L. Jean Camp: Implementing Mental Models. IEEE Symposium on Security and Privacy Workshops 2012: 86-90
[c28]Vaibhav Garg, Chris Kanich, L. Jean Camp: Analysis of eCrime in Crowd-sourced Labor Markets: Mechanical Turk vs. Freelancer. WEIS 2012
[c27]Timothy Kelley, L. Jean Camp: Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections. WEIS 2012
[e3]Jim Blythe, Sven Dietrich, L. Jean Camp (Eds.): Financial Cryptography and Data Security - FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7398, Springer 2012, ISBN 978-3-642-34637-8
[e2]Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Melanie Volkamer, Mike K. Reiter, Xinwen Zhang (Eds.): Trust and Trustworthy Computing - 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings. Lecture Notes in Computer Science 7344, Springer 2012, ISBN 978-3-642-30920-5- 2011
[j15]Debin Liu, Ninghui Li, XiaoFeng Wang, L. Jean Camp: Security Risk Management Using Incentives. IEEE Security & Privacy 9(6): 20-28 (2011)
[j14]Kelly E. Caine, Celine Y. Zimmerman, Zachary Schall-Zimmerman, William R. Hazlewood, L. Jean Camp, Katherine H. Connelly, Lesa L. Huber, Kalpana Shankar: DigiSwitch: A Device to Allow Older Adults to Monitor and Direct the Collection and Transmission of Health Information Collected at Home. J. Medical Systems 35(5): 1181-1195 (2011)
[j13]Zheng Dong, L. Jean Camp: The decreasing marginal value of evaluation network size. SIGCAS Computers and Society 41(1): 23-37 (2011)
[c26]Vaibhav Garg, Nathaniel Husted, L. Jean Camp: The smuggling theory approach to organized digital crime. eCrime Researchers Summit 2011: 1-7
[c25]Debin Liu, Ninghui Li, XiaoFeng Wang, L. Jean Camp: Beyond Risk-Based Access Control: Towards Incentive-Based Access Control. Financial Cryptography 2011: 102-112
[c24]Jim Blythe, L. Jean Camp, Vaibhav Garg: Targeted risk communication for computer security. IUI 2011: 295-298- 2010
[j12]L. Jean Camp: Identity Management's Misaligned Incentives. IEEE Security & Privacy 8(6): 90-94 (2010)
[c23]Kelly E. Caine, Celine Y. Zimmerman, Zachary Schall-Zimmerman, William R. Hazlewood, Alexander C. Sulgrove, L. Jean Camp, Katherine H. Connelly, Lesa L. Huber, Kalpana Shankar: DigiSwitch: design and evaluation of a device for older adults to preserve privacy while monitoring health at home. IHI 2010: 153-162
[c22]
2000 – 2009
- 2009
[j11]Camilo H. Viecco, Alex Tsow, L. Jean Camp: A privacy-aware architecture for a Web rating system. IBM Journal of Research and Development 53(2): 7 (2009)
[j10]
[c21]
[c20]
[c19]Debin Liu, XiaoFeng Wang, L. Jean Camp: Mitigating Inadvertent Insider Threats with Incentives. Financial Cryptography 2009: 1-16
[c18]Camilo H. Viecco, L. Jean Camp: A Risk Based Approach to Limit the Effects of Covert Channels for Internet Sensor Data Aggregators for Sensor Privacy. IFIPTM 2009: 234-251
[c17]John Duncan, L. Jean Camp, William R. Hazlewood: The portal monitor: a privacy-enhanced event-driven system for elder care. PERSUASIVE 2009: 36- 2008
[j9]Camilo H. Viecco, L. Jean Camp: A Life or Death InfoSec Subversion. IEEE Security & Privacy 6(5): 74-76 (2008)
[c16]Hillary Elmore, L. Jean Camp, Brandon Stephens: Diffusion and Adoption of IPv6 in the United States. WEIS 2008- 2007
[b2]L. Jean Camp: Economics of Identity Theft - Avoidance, Causes and Possible Cures. Springer 2007, ISBN 978-0-387-34589-5, pp. I-XII, 1-184
[c15]Christopher Thorpe, Jessica Hammer, L. Jean Camp, Jon Callas, Mike Bond: Virtual Economies: Threats and Risks. Financial Cryptography 2007: 239-244
[c14]Farzaneh Asgharpour, Debin Liu, L. Jean Camp: Mental Models of Security Risks. Financial Cryptography 2007: 367-377
[c13]- 2006
[c12]L. Jean Camp, Cathleen McGrath, Alla Genkina: Security and Morality: A Tale of User Deceit. MTW 2006
[c11]
[c10]- 2005
[c9]L. Jean Camp, Warigia Bowman, Allan Friedman: Voting, vote capture & vote counting symposium. DG.O 2005: 198-199- 2004
[j8]
[c8]
[c7]
[c6]
[p1]L. Jean Camp, Catherine Wolfram: Pricing Security - A Market in Vulnerabilities. Economics of Information Security 2004: 17-34
[e1]L. Jean Camp, Stephen Lewis (Eds.): Economics of Information Security. Advances in Information Security 12, Springer 2004, ISBN 1-4020-8089-1- 2003
[j7]
[j6]L. Jean Camp: First Principles of Copyright for DRM Design. IEEE Internet Computing 7(3): 59-65 (2003)
[j5]L. Jean Camp: Code, coding and coded perspectives. J. Inf., Comm, Ethics in Society 1(1): 49-60 (2003)
[c5]- 2002
[c4]
[c3]L. Jean Camp: DRM: doesn't realy mean digital copyright management. ACM Conference on Computer and Communications Security 2002: 78-87
[c2]Rebecca N. Wright, L. Jean Camp, Ian Goldberg, Ronald L. Rivest, Graham Wood: Privacy Tradeoffs: Myth or Reality? Panel. Financial Cryptography 2002: 147-151- 2001
[b1]L. Jean Camp: Trust and Risk in Internet Commerce. MIT Press 2001, ISBN 978-0-262-53197-9, pp. I-XIII, 1-279
[j4]L. Jean Camp, Serena Syme: Code as Embedded Speech, Machine, and Service. Journal of Information, Law and Technology 2001(2) (2001)
[j3]L. Jean Camp: An Atomicity-Generating Protocol for Anonymous Currencies. IEEE Trans. Software Eng. 27(3): 272-278 (2001)
[c1]L. Jean Camp, Helen Nissenbaum, Cathleen McGrath: Trust: A Collision of Paradigms. Financial Cryptography 2001: 82-96
[i1]Carolyn Gideon, L. Jean Camp: Limits To Certainty in QoS Pricing and Bandwidth. CoRR cs.CY/0110016 (2001)
1990 – 1999
- 1999
[j2]- 1994
[j1]L. Jean Camp, J. D. Tygar: Providing Auditing While Protecting Privacy. Inf. Soc. 10(1): 59-71 (1994)
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 10:57 CEST by the dblp team



