Curriculum Vitae

Download my Bio
Download my CV


EDUCATION

Doctor of Philosophy in Engineering and Public Policy
Carnegie Mellon University
August 1996
Thesis: Privacy & Reliability in Internet Commerce

Masters of Science in Electrical Engineering
University of North Carolina at Charlotte
August 1991

Bachelor of Arts in Mathematics & Bachelor of Science in Electrical Engineering
University of North Carolina at Charlotte
May 1989

TEACHING

for course details see the courses section of this web site

Courses Taught
Indiana: Organizational Informatics
Harvard: Analytic frameworks; Internet strategy - law, business, policy

Courses Developed & Taught
Indiana, graduate: Economics of Information Security, Social Informatics of Security
Indiana, undergraduate: Introduction to Cybersecurity, Organizational Informatics of Security
Cross-listed: Health, Technology and Aging
Harvard, graduate: Security and privacy, Internet privacy, Internet commerce, information commerce, design for values, information policy, communications policy, telecommunications modeling and policy analysis (engineering-economics)

Executive Education Topics

Indiana: Policy and economics of information security
Harvard: Open source, privacy, managing security, economics of information security

EMPLOYMENT & AFFILIATIONS
Professor
School of Informatics and Computing
Indiana University
digital trust, social and economic implications of security..

Congressional Fellow
Office of Rep. Etheridge
IEEE-USA Congressional Fellow
Jan 4, 2010 - Jan 1, 2011
portfolio: cybersecurity, defense, military construction, transportation and telecommunications. Please feel free to ask me about my IEEE-USA/AAAS fellowship experience. The most common description I have heard from colleagues is, life-changing.

Associate Professor
School of Informatics
Indiana University
August 2004 - May 2011
digital trust, social and economic implications of security..

Associate Professor
Kennedy School of Government
Harvard University
May 2002 - May 2004
digital trust, networked risk, values in as embedded in digital technology.

Visiting Scientist
Advanced Network Architecture Group
Laboratory for Computer Science
Massachusetts Institute of Technology
January 2003 -May 2003 (spring semester, Harvard research leave)
embedded values in network protocols.

Visiting Scholar
Centre for Philosophy and ICT
Erasmus University
May 2003- August 2003. (summer semester, Harvard research leave)
construction of identity through digital identifiers in the Netherlands and European Community.

Assistant Professor
Kennedy School of Government
Harvard University
November 1997 - May 2002
interdisciplinary trust research, design for values.

Senior Member of the Technical Staff
Infrastructure & Network Research
Sandia National Laboratories
Livermore, CA
September 1996 - November 1997
meta-computing, trust, clustering, computer security.

Research Assistant
Department of Engineering and Public Policy
Carnegie Mellon University
Pittsburgh, PA
August 1993 - August 1996
analyzed Internet commerce systems along the axes of reliability, privacy and security; my research moved the frontier of the conflict between reliability, which requires logging, and privacy. work resulted in two patents.

Research Assistant
Software Engineering Institute, Computer Emergency Response Team
Carnegie Mellon University
Pittsburgh, PA
May 1993 - August 1993
policy research assistant; evaluated the state of case law and statutory law with respect to the needs of system operators

Research Assistant
Information Networking Institute
Carnegie Mellon University
Pittsburgh, PA
August 1991 - May 1993
developed teaching materials and a case study in telecommunications management

Patricia Harris Fellow
Optical Interconnects & Computer Generated Holography Laboratory
University of North Carolina at Charlotte
Charlotte, NC
August 1989 - August 1991
evaluated guided wave and free space mechanisms for interconnects of multi-chip modules; designed optical devices on silicon using simple modifications of standard layout tools

Assistant Maintenance Engineer
Catawba Nuclear Station
Duke Power Company
Rock Hill, SC
August 1988 - August 1989
implemented and developed preventive maintenance programs; system responsibilities included in-core thermocouples and fire protection; assured regulatory compliance

to top

HONORS & ACTIVITIES

Honors
IEEE/AAAS Congressional Fellow, 2010
Member USACM Executive Council
President & Chair of the President of the International Financial Cryptography Association. 2003 - 2009.
Board of Governors, IEEE Society for the Social Implications of Technology, elected 2003 - 2006.
Dean's Leadership Committee, Carnegie Institute of Technology, 2002 - 2004.
Director, Computer Professionals for Social Responsibility 1999 - 2003.
Five Year Program Review Committee of the National Science Foundation CAREER Program 2001.
Renaissance Weekend participant.
Senior Member of the IEEE, elected in September 1999.

to top

Keynotes & Plenary Presentations

"Beyond Usability and Economics: Translucent Security", UNC SLIS Kilgore Lecture, (Chapel Hill, NC) 17 March 2014
"Efficient Methods to Guard Against Online Risk", Executive Office of the President, National Security Staff, (Washington, DC) 27 September 2013.
"Building Trust by Communicating Risk", UIC Distinguished Lecture Series (Chicago, IL) 14 November 2013.
"Beyond usability: Security Interactions as Risk Perceptions", Trustbuilders and Trusbusters Workshop, (Newcastle, UK) 26 July 2013. Keynote
"Policy Issues in Identity Management", Identity Management in an Open Society", US Department of State, Meridian Conference Center, 20 November 2009
"Policy Issues in Identity Management", Identity Management in an Open Society, US Department of State, Meridian Conference Center, 20 November 2009
"Design for Trust in Ambient & Ubiquitous Computing", Sixth International Conference on Ubiquitous Intelligence and Computing, (Brisbane, AU) 6-8 July 2009.
"Hardening the Network from The Friend Within", 14th Australasian Conference on Information Security and Privacy (Brisbane, AU) 4-6 July 2009.
(Plenary) "Possible Policies for the Final Eights", ARIN XXIII (San Antonio, TX) 26-29 April 2009.
"IPv6 Adoption in Autonomous Systems and Advertised Routers", RIPE 56 (Berlin, DE) 5-9 May 2008. (Plenary)
"IPv6 Diffusion Through the Lens of Economics of Security", ARIN XXI (Denver, CO) 7 April 2007. (Plenary)
"Identity in Context", IBM Identity Management Summit, (Victoria, BC Canada) April 2004.
"Unintended Consequences of Design", The International Society for Optical Engineering (SPIE) Photonics East (Boston MA) 5-8 November 2000. (Plenary)
"When Data = Death, Security for Medical Information Systems", The IEEE Information Technology Applications in Biomedicine Third International Conference (Arlington VA) 9-10 November 2000.

to top

Appointments & Affiliations

Director, Masters of Science in Security Informatics, 2008-2014.
Indiana University Representative, Institute for Information Infrastructure Protection, 2006-2009; 2012-2013.
Visiting Scientist, Dept. of Computer Science, University City London, Summer 2007.
National Research Council and Election Assistance Commission, Technical Workshop for Chief Technology Officers, June 2005.
Member, ACM Task Force on Job Migration, 2004 - 2005.
Selected participant, CRA-W Cohort for Associate Professors Project, June 2005.
Affiliate, National Center for Digital Government, 2001- 2004.
Visiting Professor, Erasmus University, summer 2003.
Visiting Scientist, Laboratory for Computer Science, MIT (spring semester, research leave).
Editorial Board, International Journal of Technology Policy and Management 1999 - present.
IEEE Committee on Communications and Information Policy (CCIP) 1999 -present.
Member USACM 1996-present.
Research Affiliate, Internet and Telecom Convergence Consortium, MIT.
Visiting Professor, Centre for Computing and Social Responsibility, UK, summer 2001.
Granted Educational Leave with Benefits, Duke Power Company 1989.

to top

Additional Professional Service
Editorial Board, International Journal of Technology Policy and Management, 1999-2000.
NSF REviewer, various programs and dates.
Economic & Social Research Council Reviewer, United Kingdom, 2003 - 2004.
Reviewer: Communications of the ACM, IEEE Transactions on Computing, Mgt. Science, RAND Journal etc.
Special Issue Editor: Designing Across the Digital Divide, The Journal of Information, Communication and Ethics in Society (ICES). Vol. 1, No. 3. May 2003.
Special Issue Editor: Usable Privacy and Security, IEEE TEchnology and Society, March 2007.
Special Issue Editor: Cybersecurity, I/S A Journal of Law and Policy for the Information Society. Winter 2006.
Special Issue Editor: Cybersecurity, I/S A Journal of Law and Policy for the Information Society. Winter 2007.

to top

Program Chair

USEC 12, a workshop affiliated with Financial Cryptography 2012 Jim Blythe, co-Chair.

Security and Privacy in Medical and Home-Care Systems, a workshop affiliated with ACM CCS

The 36th Research Conference on Communication, Information and Internet Policy 26 - 28 September 2008, George Mason University School of Law, (Arlington, VA).

The I3P Workshop on Insider Threats in the Networked World an invitation-only workshop combining researchers and industry to define the parameters of the insider threat, 15 - 16 April 2008, Duke Conference Center (Durham, NC).

DIMACS Workshop on Economics of Information Security18 - 19 January 2007, DIMACS, Rutgers University,, (Piscataway, NJ)
co-chair: Alessandro Acquisti.

The Fourth Workshop on Economics of Information Security (WEIS05) , 1-3 June 2005, Kennedy School of Government, Harvard University (Cambridge, MA)
General Chair: Allan Friedman.

The Voting, Vote Capture, and Vote Counting Symposium, a one day event on design of process, technology and their interaction in voting systems. June, 2004 Kennedy School of Government, Harvard University (Cambridge, MA).
General Chair: Allan Friedman.

Identity: The Civic Scenario a two day workshop on the role of identifiers in digital government. April 2003 Kennedy School of Government, Harvard University (Cambridge, MA).

CPSR Annual Meeting 2002, Shrinking World, Expanding Net: Designing Technology for Developing Nations 5 October 2002 (Cambridge, MA)
Also General Chair.
to top

Program Committees
PETS 2012, SOUPS 2012, TRUST SES 2012, WEIS 2012, WSCS a IEEE Security \& Privacy Workshop.

ETHICOMP 2011, WEIS 2011, CFP Research Track 2011, PETS 2011.

Financial Cryptography and Data Security 2010 (FC10), Workshop on Economics of Information Security (WEIS 2010), 4th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2010. All others refused due to sabbatical.

Third IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2009); Symposium on Usable Privacy and Security (SOUPS 2009); Workshop on the Economics of Security (WEIS 2009); Security Measurement and Metrics (MetriSec2009); 2009 World Congress on Privacy, Security, Trust and the Management of e-Business (CONGRESS09);ACM Computer and Communications Security Conference (ACM CCS).

ACM Computer and Communications Security Conference (ACM CCS 2008); Seventh Workshop on the Economics of Information Security (WEIS 2008); Fourth Quality of Protection Workshop (QoP 2008); The Tenth ETHICOMP International Conference on the Social and Ethical Impacts of Information and Communication Technology (ETHICOMP 2008); Third Annual APWG eCrime Researchers Summit. ECrime 2008

Sixth Workshop on the Economics of Information Security (WEIS 07); Privacy Enhancing Technologies Workshop 2007 (PETS 2007); Dependability and Security in e-Government (DeSeGov 2007); ETHICOMP 2007.

iTrust 2006; The Fifth Workshop on the Economics of Information Security (WEIS 06); Workshop on the Economics of Securing the Information Infrastructure; Workshop on Privacy in the Electronic Society (WPES 2006); Workshop on Digital Rights Management (DRM 2006); Second European Conference on Mobile Goverment (EURO Mgov 2006).

Workshop on Privacy Enhancing Technologies; Workshop on Digital Rights Management Systems, 2005; (WPES) 2005; ETHICOMP 2005.

Workshop on Digital Rights Management Systems, 2004; Privacy Enhancing Technologies (WPES) 2004; ITS European Regional Conference 2004; ETHICOMP 2004; Third Workshop on the Economics of Information Security (WEIS 04).

Workshop on Digital Rights Management Systems, 2003; Fifth International Conference of Electronic Commerce, 2003; Privacy Enhancing Technologies, 2003; ETHICOMP 2003; Second Workshop on the Economics of Information Security (WEIS 03).

Telecommunications Policy Research Conference, 2001; Inaugural Workshop on the Economics of Information Security.

The Internet and Society, Harvard University, 2000; Telecommunications Policy Research Conference 2000.

Organizing Committee: IEEE CCIP "The Evolution of the US Telecommunications Infrastructure over the Next Decade", Ithaca, NY. "Governing the Commons: Future of Global Internet Administration Conference", sponsored by Computer Professionals for Social Responsibility 1999.

to top

PATENTS

Patent Number 6,317,729: Anonymous Certified Delivery with SET.
Patent Number 6,076,078: Anonymous Atomic Transactions.
Provisional Patent: Peer to Peer Information to Enhance Security.
Provisional Patent, Pharming Detection Using Personal Histories, 2007.
Patent, Privacy-Aware Portal Monitor, 2008, under submission.

to top

PUBLICATIONS

Books

L. Jean Camp, Trust & Risk in Internet Commerce, MIT Press, Winter (Cambridge, MA) 2000.

L. Jean Camp & Stephen Lewis, "The Economics of Information Security" Kluwer Academic Press, 2004.

L. Jean Camp & M. Eric Johnson, "Financial and Medical Identity Theft" Springer 2011

to top

Book Chapters

Timothy Kelley & L Jean Camp, "Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections", Selected Papers from WEIS 2012, Springer (Berlin, DE) Ch. 8 pp 159-184. (Previous version published in WEIS, see below)

Andrew Patrick and L Jean Camp, "Risk Mitigation From the Release of Personal Identity Information", Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards. IGI Global. 2011

J. Duncan & L. Jean Camp, "The Portal Monitor: A Privacy-Aware Event-Driven System for Elder Care" Rocker, C., Ziefle, M. (Eds.) Smart Healthcare Applications and Services: Developments and Practices. IGI Publishing (Niagara Falls, NY) 2010

L. Jean Camp & Kay Connelly, "Privacy in Ubicomp" Digital Privacy: Theory, Technologies and Practices eds. Alessandro Acquisti, Sabrina De Capitani di Vimercati, Stefanos Gritzalis and Costas Lambrinoudakis, Taylor & Frances. (New York, NY (2007) Previous Version Available,

L. Jean Camp "Varieties of Software and their Implications for Effective Democratic Government", Oxford University Press (Oxford, UK) 2006.

Allan Friedman & L Jean Camp, "Security in Peer to Peer Systems", The Handbook of Information Security ed. Hossein Bidgoli, John Wiley & Sons (Hoboken, New Jersey) 2004.

L. Jean Camp & Ka-Ping Yee "Human implications of technology", Practical Handbook of Internet Computing ed. M. P. Singh, CRC Press (New York, NY) Winter 2003.

L. Jean Camp Peer to Peer Systems, The Internet Encyclopedia ed. Hossein Bidgoli, John Wiley & Sons (Hoboken, New Jersey) 2003.

L. Jean Camp, "Design for Trust", Trust, Reputation and Security: Theories and Practice, ed. Rino Falcone, Springer-Verlang (Berlin) 2003.

L. Jean Camp & Carlos Osorio,"Privacy Enhancing Technologies for Internet Commerce", Trust in the Network Economy, Springer-Verlag (Berlin) 2003.

L. Jean Camp, Cathleen McGrath & Helen Nissenbaum, "Trust: A Collision of Paradigms", Proceedings of Financial Cryptography, Lecture Notes in Computer Science, Springer-Verlag (Berlin, Germany) Fall 2001. Slides and notes from the conference available.

L. Jean Camp, "The Shape of the Network", Governance in a Globalizing World, ed. J. Donahue, Brookings Press (Washington, DC) Summer 2001.

L. Jean Camp & Y.T. Chien, "The Internet as Public Space: Concepts, Issues and Implications in Public Policy", Readings in Cyberethics, eds. R. Spinello and H Tavani, Jones and Bartlett Publishers (Sudbury , MA) January 2001. Previously published in ACM Computers & Society, September 2000. Previous version available

L Jean Camp, "The Post-Convergence Consumer", Creative Destruction, ed. Lee McKnight, MIT Press, Winter (Cambridge, MA) 2000.

L. Jean Camp, "Community Considered", democracy.com? Governance in a Networked, World Hollis Publishing (Hollis, NH) 1999.

L. Jean Camp, D. Riley, "Bedrooms, barrooms & board rooms on the Internet: the failure of media types in cyberspaces", Selected Papers from the 1996 Telecommunications Policy Net Trust and Trust on the Web, Research Conference, eds. G.L. Rosston & D. Waterman; Lawrence Earlbaum Associates (NY, NY) 1997. A previous version presented at Virtue & Virtuality: A Conference on Gender, Law and Cyberspace, MIT Cambridge, MA, 19-20

L. Jean Camp, "The systers mailing list", Wired Women: Gender and New Realities in Cyberspace, eds., L. Cherny & E. Weise, The Seal Press, (Seattle, WA) January 1996.

M. Feldman, L. Jean Camp, J. Stack & J. Morris, "Optical interconnects", Chapter 7: Design Issues in Optical Computing, ed. John Lee, Cambridge University Press (Cambridge, MA) 1993.

to top

Journals
Vaibhav Garg, Thomas Koster and L. Jean Camp, "Cross-country Analysis of Spambots", EURASIP Journal on Information Security, 2013:3 doi:10.1186/1687-417X-2013-3

Vaibhav Garg, L. Jean Camp, Lesa Lorenzen-Huber, Kalpana Shankar, Kay Connelly, "Privacy Concerns in Assisted Living Technologies", Annals of Telecommunications, Volume 69, Issue 1-2 , pp 75-88 doi: 10.1007/s12243-013-0397-0

Warigia Bowman, L Jean Camp, "Protecting the Internet from Dictators: Technical and Policy Solutions to Ensure Online Freedoms", The Innovation Journal, 18(1), 2013, article 3.

Lesa Huber, Kalpana Shankar, Kelly E. Caine, Katherine H. Connelly, L. Jean Camp, Beth Ann Walker, and Lisa Borerro. In-home Technologies and Caregiver Relationships, International Journal of Human-Computer Studies, 29 (7), 441-455 (2013).

V. Garg, L. Huber, L. J. Camp, K. Connelly, Risk Communication Design for Older Adults, Gerontechnology 2012; 11(2).

Caine, K. E., Zimmerman, C. Y., Schall-Zimmerman, Z., Hazlewood, W. R., Camp, L. J., Connelly, K. H., Huber, L. L, & Shankar, K, 2011, DigiSwitch: A device to allow older adults to monitor and direct the collection and transmission of health information collected at home. Journal of Medical Systems Vol. 35, No. 5, 1181-1195.

Zheng Dong & L Jean Camp, 2011, The decreasing marginal value of network size, ACM SIGCAS, Vol. 41 (1).

Debin Liu, Ninghui Li, XiaoFeng Wang, and L. Jean Camp, Security Risk Management using Incentives, IEEE Security & Privacy. Vol. 9, No. 6: 20-28 (2011).

L. Jean Camp, "Re-conceptualizing the Role of Security User, of Security User, Daedalus, Fall 2011, Vol. 140, No. 4: 93–107.

K. Shankar, Camp, L.J, Lorenzen-Huber, L, Connelly, K, "Aging, Privacy, and Home-Based Computing: Designing for Privacy", IEEE Pervasive Computing (accepted) 2011.

Lorenzen-Huber, L. Boutain, M., Camp, L.J., Shankar, K., Connelly, K., "Privacy, Independence, and Relationships: Older Adults Perceptions of Home-Based Ubiquitous Technologies", Ageing International (accepted) 2010.

Debin Lui, Jean Camp, XiaoFeng Wang, "Using Budget-Based Access Control to Manage Operational Risks Caused by Insiders", Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Vol 1, No 1 (2010) Previously version published at MIST 2010.

Debin Liu, XiaoFeng Wang and L. Jean Camp, "Game Theoretic Modeling and Analysis of Insider Threats", International Journal of Critical Infrastructure Protection (IJCIP) accepted (Previously presented at IFIP International Conference on Critical Infrastructure Protection, March 16-19, 2008, Washington, D.C.)

Alex Tsow, Camilo Viecco, and L. Jean Camp, Privacy-Aware Architecture for Sharing Web Histories, IBM Systems Journal, accepted.

L. Jean Camp, Net Trust: Signaling Malicious Web Sites, I/S A Journal of Law and Policy in the Information Society, 2007, Vol. 3, No 2: 211-235.

L Jean Camp, "Mental Models of Security," IEEE Technology & Society, 2009) No 3:28, IEEE, Pages: 37-46..

L Jean Camp, "Economics of Information Security" I/S A Journal of Law and Policy in the Information Society, Vo. 2, No. 2., pp 190-205.

L Jean Camp, "Digital Identity," IEEE Technology & Society, 2004, Vol. 23, No 3 pp. 34 - 41. Previous version available.

L. Jean Camp & Charles Vincent, "Looking to the Internet for Models of Governance" Ethics and Information Technology, 2004, Vol. 6, No. 3, pp. 161-174.

L. Jean Camp, Fu-Shoun Mao & Mridul Chowdhury, "Thailand at the Crossroads in ICTs" International Journal of Technology Policy and Management. Vol. 4, No. 2, pp. 116-135.

L. Jean Camp, "Principles for Design of Digital Rights Management Systems"IEEE Internet ComputingVol. 6, No. 3 pp. 59-65, May 2003. Previous version available as "DRM Doesn't Really Mean Copyright" in the peer-reviewed Proceedings of the 2003 ACM Conference on Computer and Communications Security, ACM Press (NY NY).

L. Jean Camp, "Code, Coding and Coded Perspectives", Journal of Information, Communication and Ethics in Society Vol. 1, Jan. 2003, pp. 49-59. (Previously published in the abstract-refereed conference "Code, Coding, and Coded Perspectives", Association of Internet Researchers, Lawrence , Kansas, September 2000.)

L. Jean Camp & Serena Syme,"The Governance of Code: Open Land vs. UCITA Land" ACM SIGCAS Computers and Society, September 2002, Vol. 32, No. 3.
Also available at The ACM Computers and Society Page

L. Jean Camp, "An atomicity-generating layer for anonymous currencies", IEEE Transactions on Software Engineering, March 2001, Vol. 27, No. 3, pp. 272-278.

L. Jean Camp & Serena Syme, "A Coherent Intellectual Property Model of Code as Speech, Embedded Product, or Service", Journal of Information Law and Technology, Vol. 2, 2001.

L. Jean Camp & Y.T. Chien, "The Internet as Public Space: Concepts, Issues and Implications in Public Policy", ACM Computers & Society,Vol. 30, No. 3, September 2000. (Also selected for inclusion in Readings in Cyberethics as noted above.)

L Jean Camp & Ken Lewis, "Code as Speech: a discussion of Bernstein v. USDOJ, Karn v. USDOS, and Junger v Daley in light of the U.S. Supreme Court's shift to Federalism",Ethics and Information Technology, March 2001. Vol. 1, No. 2, pp. 1-13. (Earlier version presented at CEPE 2000:Computer Ethics: Philosophical Inquiry, Dartmouth College Hanover, NH (USA) 13-16 July 2000, an abstract-referred conference. Draft version available.)

L. Jean Camp, "The World in 2010: Many New Entrants", info: the journal of policy, regulation and strategy for telecommunications, information and media, Vol. 2 No. 2, April 2000, 167-186.

L. Jean Camp & Brian Anderson, "Deregulating the Local Loop: The Telecommunications Regulation Path Less Chosen as Taken by Bangladesh" , International Journal of Technology Policy and Management Vol. 1, Issue 1. Earlier version presented at INET 2000.

L. Jean Camp & Rose Tsang, "Universal service in a ubiquitous digital network", Journal of Ethics and Information Technology, accepted. Previous version presented at INET 1999, an Internet Society abstract-refereed conference .

L. Jean Camp, "Democratic Implications of Internet Protocols" The Information Society, Vol. 15, 249 -256, 1999. Previous version presented by invitation at DIMACS Workshop on Design for Values: Ethical, Social and Political Dimensions of Information Technology, February 28 - March 1, 1998; Princeton University, Department of Computer Science, Princeton NJ. Initial version presented as "Privacy on the Web", at the peer-referred conference Symposium on Network & Distributed System Security, 10-11 February 1997, San Diego, CA.

L. Jean Camp & Marvin Sirbu, "Critical issues in Internet commerce", IEEE Communications, May, 1997.

L. Jean Camp, "Privacy: from abstraction to applications", Computers & Society, Sept. 1994, Vol. 24, No. 3, 8-15.

L. Jean Camp & J. D. Tygar, "Providing auditing and protecting privacy", The Information Society, March 1994, Vol. 10, No. 1, 59-72

L Jean Camp, R. Sharma & M. Feldman, "Guided-wave and free-space optical interconnects for parallel-processing systems: a comparison", Applied Optics, 10 September 1994, 6169-6180. Also presented at the Optical Society of America's Annual Meeting, November 1990, Boston MA.

to top

Peer Reviewed Conferences

Kalpana Shankar, Lesa Huber. L.Jean Camp, Kelly E. Caine, and Katherine H. Connelly, "Finding the Older User in Home-Based Computing Studies", International Society on Gerontechnology* International Symposium of Automation and Robotics in Construction (ISG*ISARC 2012). Eindhoven, Netherlands, June 26-29, 2012.

Huber, L., Camp, L.J., Garg, V., Borrero, L. (2012). "Staying safe online: How to protect your money and your privacy", Association for Gerontology in Higher Education 38th Annual Meeting. Arlington, VA.

Zheng Dong and L. Jean Camp, "Policy Proposal: Limit Address Allocation to extend the Lifetime of IPv4 in the APNIC Region", ACM ACSAC Workshop on Governance of Technology, Information, and Policies (GTIP 10), 6-10 Dec. 2010 (Austin, TX).

V, Garg, N. Husted & L. Jean Camp, The Smuggling Theory Approach to Organized Digital Crime, APWG eCrime Researchers Summit (San Diego, CA) 8-9 November 2011. Best Paper Award.

J. Blythe, L. Jean Camp & V. Garg, "Targeted Risk Communication for Computer Security", 2011 International Conference on Intelligent User Interfaces, (Palo Alto, CA) 13-16 February 2011.

Zack Zimmerman & L Jean Camp, "Elder-friendly Design Effects on Acceptance of Novel Technologies", Elderly Interaction Design CHI; CHI 2010 Workshop, (Atlanta GA.) 4 April 2010.

A. Nematzadeh & L.Jean Camp, "Threat Analysis of Online Health Information System", Proceeding of 3rd International Conference on Pervasive Technologies Related to Assistive Environments, 2010 (Samos, GR) 23-25 June 2010.

Jean Camp, Rui Wang, & Xiaoyong Zhou "Four Paths Forward for IPv6 Adoption", Second International Symposium on Global Information Governance (ISGIG), Conflict and Collaboration in Compliance, Governance and Risk (Prague) 15-16 September 2009.

J. Duncan, L. Jean Camp & William R. Hazlewood "The Portal Monitor: A Privacy-Enhanced Event-Driven System for Elder Care", Persuasive 2009 (Claremont, CA) 26-29 April 2009.

Camillo Viecco & L Jean Camp, "A Risk-Based Approach to Limit the Effects of Covert Channels for Internet Sensor Data Aggregators for Sensor Privacy", IFIPTM09: IFIP International Conference on Trust Management, (West Lafayette, IN) June 15-19, 2009

Debin Liu, L Jean Camp & XiaoFeng Wang, "Mitigating Insider Threats with Incentives", Financial Cryptography and Data Security, (Barbados, BWI) 23-26 February 2009.

Hillary Elmore, L Jean Camp & Brandon Stephens, IPv6 Diffusion, WEIS 2008, 22-25 September 2008 (New Haven, CN).

Alex Tsow, Faraneh Asgarpour & L. Jean Camp Usability Analysis and User Trust Behaviors of a Social Networking Toolbar, APWG eCrime Researchers Summit (Pittsburgh, PA) 4 -5 Oct. 2007.

Farzeneh Asgapour, Debin Liu and L. Jean Camp, Risk Communication in Computer Security using Mental Models, WEIS 2007, (Pittsburgh, PA) 5-6 June 2007.

Farzeneh Asgapour, Debin Liu and L. Jean Camp, "Mental Models of Computer Security Risks: Experimental Results", Usable Security 07, (Tobago) 16 February 2007.

L. Jean Camp, "Reliable Usable Signaling to Defeat Masquerade Attacks" WEIS 2006 (Cambridge, MA) 26-28 June 2006.

Debin Liu & L Jean Camp, ";Proof of Work Can Work" WEIS 2006 (Cambridge, MA) 26-28 June 2006.

L. Jean Camp, Cathleen McGrath & Alla Genkina, Security and Morality: A Tale of User Deceit, Models of Trust for the Web MTW'06, (Edinburgh, Scotland) 22 May 2006.

Serena Chan & L. Jean Camp, "Towards Coherent Regulation of Law Enforcement Surveillance in the Network Society ", Ethicomp: The Social and Ethical Impacts of Information and Communications Technologies, Technical University of Gdansk (Gdansk, Poland) 18-20 June 2001, Vol. 2 pp. 86-101. Previous version presented at The 5th International Conference on Technology, Policy, and Innovation, Delft, The Netherlands, 2001.

Serena Syme & L. Jean Camp, "The Governance of Code: Code as Governance", Ethicomp: The Social and Ethical Impacts of Information and Communications Technologies, Technical University of Gdansk (Gdansk, Poland) 18-20 June 2001, Vol. 1, pp. 86-101.

L. Jean Camp & Catherine Wolfram, "Pricing Security", Proceedings of the CERT Information Survivability Workshop, (Boston, MA) Oct. 24-26, 2000, pp. 31-39.

D. Evensky, A. Gentile, L. Jean Camp, & R. Armstrong, "Lilith: Scalable Execution of User Code for Distributed Computing", Proceedings of The 6th IEEE International Symposium on High Performance Distributed Computing, HPDC-6 (Portland, OR) August 1997, pp. 123-145.

L. Painton, T. Gaylor, L. Jean Camp, C. Phillips, G. Wyss, "Risk-based characterization of network vulnerability", CERT Information Survivability Workshop (San Diego, CA) 12 - 13 February 1997, pp. 62-64.

L. Jean Camp, Michael Harkavy, J.D. Tygar and Bennet Yee, "Anonymous atomic transactions," 2nd Annual USENIX Workshop on Electronic Commerce Proceedings (Oakland, CA) November 1996, pp. 123-134.

L. Jean Camp, M. Sirbu & J. D. Tygar, "Token and notational money in electronic commerce", USENIX Workshop on Electronic Commerce, July 1995, New York, NY, 1-12. A previous version presented at the Telecommunications Policy Research Conference (Solomons Island, MA) October 1994, pp. 1-12.

L. Jean Camp & D. Riley, "Protecting an unwilling electronic populace", Proceedings of the Fifth Conference of Computers Freedom and Privacy (San Francisco, CA) 28-31 March 1995, pp. 120-139.

L. Jean Camp & M. Sirbu, "Networking strategy at The Travelers' Insurance", Proceedings of ACM SIG in Computer Personnel Research Conference (St. Louis, MO) April 1993, pp. 450-463.

to top

Abstract-Refereed Conferences

V. Garg & L. Jean Camp, End User Perception of Online Risk Under Uncertainty, Hawaii International Conference On System Sciences, (Manoa, HI) 4-7 January 2012.

Huber, L., Borrero, L., Walker, B.A., Shankar, K., Caine, K., Connelly, K., Camp, L.J. (2011, November). How Older Adults Use Information Technology to Reduce Caregiver Burden, Gerontological Society of America 64th Annual Scientific Meeting, Boston, MA.

Huber, L.L., Camp, L.J., Connelly, K.H., Shankar, K., Caine, K., Hazlewood, W., Zimmerman, Z. "A Privacy Framework for Evaluating In-Home Technologies", Conference Proceedings, Gerontological Society of America 63rd Annual Scientific Meeting, (New Orleans, LA). 2010.

Camp, L.J., Huber, L..L., Borrero, L. "What do older adults understand about their privacy risks while online?" Conference Proceedings, Gerontological Society of America 63rd Annual Scientific Meeting, (New Orleans, LA). 2010.

Jean Camp, Four Paths Forward for IPv6 Adoption, TPRC (Arlington, VA) 28 Sept. 30 Sept. 2008.

L. Jean Camp & Debin Liu, Proof of Work {cannot, can, does currently} Work, TPRC (Arlington, VA) 28 Sept. 30 Sept. 2007.

L. Jean Camp, L. Huber, & Kay Connelly, "Designing Ubicomp with Privacy Constraints Defined by Users", Nurturing Technologies in the Domestic Environment: Feeling Comforted, Cared for, and Connected at Home, (Orange County, CA) 18 Sept. 2006. Workshop held conjunction with Ubicomp 2006.

L. Jean Camp, & Kay Connelly "Beyond Consent: Implications of Ubicomp for Privacy", TPRC 2006, (Washington, DC) 29 Sept.

L. Jean Camp, Peer Production of Privacy and Security Information Ethical Surveillance, 8-10 June 2005 (Austin TX).

L. Jean Camp, Kay Connelly, & Kalpana Shankar, Design for Privacy: Towards a Methodological Approach to Trustworthy Ubicomp Design, Ethicomp 2005, 12 -14 September, 2005 (Linkoping, Sweden).

L. Jean Camp & Allan Friedman, Peer Production of Security & Privacy Information, Telecommunications Policy Research Conference e (Alexandria, VA) 23- 25 September 2005.

Allan Friedman, Alla Genkina and L Jean Camp, Net Trust: Designing for Human Trust Perception, Trustworthy Interfaces for Passwords and Personal Information (Stanford University, Palo Alto, CA)13 June 2005.

L. Jean Camp, Warigia Bowman & Allan Friedman Voting, Vote Capture & Vote Counting Symposium, Proceedings of the 6th Annual National Conference on Digital Government Research, 15-18 May 2005 (Atlanta, GA). pp. 198 .

Jean Camp & Allan Friedman, Peer patching, 24th Army Science Conference, 28 November - 2 December 2004 (Orlando, FL)

Jean Camp, "Digital Identity", International Symposium on Technology and Society 2003--Crime Prevention and Security 24 - 26 September 2003 (Amsterdam, 2003).

L Jean Camp & Allan Friedman, "Peer to Peer Security" Telecommunications Policy Research Conference, 19-21 September 2003.

Allan Friedman & L. Jean Camp, "Making Security Manifest" Second Workshop on the Economics of Information Security, College Park, MA. May 2003.

L. Jean Camp, " 'Marketplace incentives to prevent piracy': An incentive for security?", First Workshop on the Economics of Information Security, Berkeley, CA. May 2002.

L. Jean Camp & Carolyn Gideon, "Certainty in Bandwidth or Price" The 29th Research Conference on Communication, Information and Internet Policy, Washington, D.C. Oct. 2000.

L. Jean Camp, "Code, Coding, and Coded Perspectives", Association of Internet Researchers, Lawrence , Kansas, September 2000.

L. Jean Camp, "Privacy and Security Implications of Quality of Service Mechanisms", Workshop On Internet Service Quality Economics, MIT Cambridge. MA. 2-3 December 1999.

L. Jean Camp & B. Anderson, "Expansion of Telecommunications Infrastructure in Emerging Nations: The Case of Bangladesh", Telecommunications Policy Research Conference, Alexandria, VA. 25-26 Sept. 1999.

L. Jean Camp, D.A. Evensky, "Survivability & Trust", Research Directions for the Next Generation Internet, 12-14 May 1997, Washington, DC.

to top

Editor Selected & Invitation Only

V. Garg & L. Jean Camp, "How Safe is Safe Enough: The Online Version", Workshop on Security and Human Behavior, (Cambridge, UK) 28-29 June 2010.

V. Garg & L. Jean Camp, Privacy, Ubicomp, and Older Adults, Workshop on Security and Human Behavior, (Carnegie Mellon, PA) 17-18 June 2011.

Identity and Incentives, IEEE Security & Privacy, fall 2010.

A Life or Death InfoSec Subversion, IEEE Security & Privacy, with Camilo Viecco. November 2008.

Book review of "Power and Security in the Information Age", Information, Communication and Society, 2008

Extended Abstract: Mental Models of Computer Security, Proceedings of Financial Cryptography 2004, Lecture Notes in Computer Science, Springer-Verlag (Berlin) September 2004.

J. Camp "Access Denied" IEEE Security & Privacy vol. 1, no. 5, Sept./Oct. 2003, pp. 82-85.

"A Review of Financial Cryptography," CIPHER, Issue 42, May 1, 2001.

"A Review of the Seventh Financial Cryptography," CIPHER, April 2003.

Internet Voting is No Solution, Belfer Center for Science and International Affairs. November 28, 2000.

Editorial, "Computer Attacks have focused on the wrong issues," Boston Globe. February 17, 2000

Book review: "The Internet Economy: Access, Taxes, and Market Structure. by Alan Wiseman", Brookings Institution Press, 2000, pp. 128

L. Jean Camp & Brain Anderson, "Grameen Phone: Empowering the Poor through Connectivity", iMP: The Magazine on Information Impacts (December 1999).

L. Jean Camp, "Why do Phil’s travails matter?", IEEE IMPACT, August 1995: 1.

L. Jean Camp, "Cryptography policy needs another look", IEEE Spectrum, June 1994, 15-16.

Additional Writings
Voting and Vote Counting: The Annotated Best Practices, Institute of Politics, Harvard, (Cambridge, MA) July 2004. Distributed as model research by Kennedy School of Government of Harvard Universiy to all attendees of the Democratic National Convention.

Identity in Digital Government: A Research Agenda, Harvard, Nov. 2003. Over 200 copies distributed by the National Science Foundation and the Kennedy School of Government.

Special Issue Editor: Designing Across the Digital Divide, The Journal of Information, Communication and Ethics in Society (ICES). Vol. 1, No. 3. May 2003.

R. Morris & L. Jean Camp, "Wine on the Wire: Press Coverage of Internet Commerce", Shorenstein Center on the Press, Politics, & Public Policy Computer Security Mental Models of Experts and non-Experts Working Paper Series, 6 Feb. 1999.

to top

Selected Presentations & Panels
"Translucent Security", School of Computer Security Seminar Series, University of North Carolina Charlotte, (Charlotte, NC) 3 May 2011.

"Human Behaviors and Security", Cyber Security: Exploring the Human Element (National Press Club, Washington, DC) 8 March 2011.

"People Taking Risks Online", Security and Human Behaviors, (MIT, Cambridge MA) 11 June 2009.

"Online Economics Behaviors: Taking Risks", Security Economics Workshop (London, UK) 26 June 2009.

"Exactly What Is it That You Will Never Admit? Challenges to User-Centered Research in Privacy", Privacy Methodologies Workshop (London, UK) 23 - 24 March 2009

"Economics of Security: What is Next?", Financial Cryptography (Christ Church, Barbados) 25 Feb. 2009.

Security@Home Sun Microsystems Intellectual Desserts (Menlo Park, CA) 13 November 2008.

Security & Elders, IPSI Public Lecture Series, University of Toronto (Toronto CN) 10 Nov. 2008.

Security & Human Behavior, Interdisciplinary Studies in Information Security (Monte Verita, SW),7-11 July 2008.

Mental Models of Security Security & Human Behavior, (MIT Cambridge MA) 2-3 July 2008.

The Inadvertent Insider: Communicating Security Risks, The Insider Threat in the Networked World, (Durham, NC) 15-16 April 2008.

IPv6 Diffusion: Learning from Economics of Security, CISCO Workshop on the Future of Internet Addressing, (Milpitas, CA) 4 March 2008. with Hillary Elmore.

Communicating Security State using Net Trust, Google Research Seminar, (Mountain View, CA) 28 February 2008. with Brandon Stephens

"Privacy in ubiquitous and home computing", University City London / British Telecom Computer Science Seminar, (Ipswich, UK) 1 August 2007.

"Computer Security and Human Trust Behaviors", 2007 Decision and Risk Analysis Conference: Convergence Between Finance and Industry (Dallas, TX) 22-23 May 2007.

"Net Trust: A Status Report", Symantec Research Seminar (Mountain View, CA) 4 May 2007.

"Trust and Trusted Computing", Usable Security (Tobago, BWI) 16 February 2007.

"Games, Privacy, Identity: The Coming Collision of Virtual & Real", Financial Cryptography (Tobago, BWI) 14 February 2007.

"Defeating Spam One Account at a Time", Money Finance and Growth: XV International Tor Vergata Conference on Banking and Finance, Faculty of Economics (Rome, IT) 13 December 2006.

"Net Trust: Embedding Identity in Social Context", Oxford Internet Institute Research Seminar, (Oxford, UK) 7 December 2006.

"Economics of Identity", 7th Annual Privacy and Security Workshop: Your Identity Please: Identity Theft and Identity Management in the 21st Century, Toronto School of Law (Toronto, CN) 2-3 November 2006.

"Economics of Security as Design Parameters", School of Information Research Seminar, University of Michigan, (Ann Arbor, MI) 26 October 2006.

"Beyond Usable Security: A Matter of Trust, An Issue of Risk" Workshop on Future Directions for NSF Cyber Trust Program (Pittsburgh, PA) 5-7 October, 2006.

"Hard Wired Identity", Oxford Internet Institute (Balliol College, Oxford, UK) 29 Sept. 2006.

"Open Code, Free Software, and Governance" Open Soource in the International Marketplace, University of Pennsylvannia School of Law Symposium (Philadelphia, PA) 31 March 2006.

"Forging Trust Using Reliable Economic Signals" CERIAS Annual Symposium, (West Lafayette, IN) 22 March 2006.

Human Autonomy in an Age of Active Aware Pervasive Computing, AAAS Annual Meeting (Chicago, IL) 16-20 February 2006.

Net Trust Google Security Group Research Presentation, (Mountain View, CA) 3 August 2005.

Privacy in Voting, Technical Workshop for Chief Technology Officers, National Research Council and Election Assistance Commission (Washington, DC) June 2005.

Allan Friedman, Alla Genkina and L Jean Camp, Social and Network Trust, DIMACS (New Brunswick NJ) 14 - 15 April 2005.

Economics of Information Security, CFI-CIRT, BMO Financial Group (Toronto CN) 10 February 2005.

The Economics of Information Security, 13th CACR Information Security Workshop & 5th Annual Privacy and Security Workshop: Privacy and Security: Seeking the Middle Path, Centre for Applied Cryptographic Research, (Toronto, Canada) October 2004.

Economics of Information Security, Second Workshop on the Economics of Peer-to-Peer Systems, Harvard University, (Cambridge, MA) June 2004.

Identity as a Social and Technical Construct, 14th IEEE-RIDE (Research Issues on Data Engineering) Workshop Web Services for E-Commerce and E-Government Applications (Boston, MA) 28 April 2004.

"Open Source, Myth Versus Reality", Massachusetts Executive Leadership Forum (Boston, MA) 15 October 2003.

Panel organized and Chaired, Privacy in Internet Commerce, International Conference on Electronic Commerce (Pittsburgh, PA) 1 - 3 October 2003.

"Identity in Digital Government; Best Practices and a Research Agenda" Max Planck Institute (Bonn, Germany) 14 July 2003.

Using Ethnographic Data to Evaluate Technical Design WebShop 2003. University of Maryland (College Park, MA) 3-5 June 2003.

"Privacy by Design: A Study in Cooperation Across Disciplines ", Workshop on Public Values, Systems Design, and the Public Domain , Sponsored by the Programme in Cooperative Media Law & Policy, Oxford. (Bellagio, Italy) 3-7 March 2003.

"Trust and Risk in Internet Commerce: Design for Trust", The Institute for Security Technology Studies, Dartmouth University (Dartmouth, NH) January 17, 2003.

"Design for Values in DRM ", MITRE (Bedford, NH) 15 November 2002.

"Thailand At the Crossroads in Telecommunications ", International Conference on Science, Technology and Innovation BCSIA, KSG. Harvard (Cambridge, MA) 23- 24 September 2002.

"Digital Rights Management as Design for Trust " Public Design Workshop , NYU Law School (NY, NY) 13-14 September 2002.

"Returning to First Principles: The Functions of Copyright as a Basis for DRM in 2002" Cryptography and Information Security Group Seminar (MIT Cambridge, MA) April 2002.

"Privacy Models and Business Plans" Internet & Telecoms Convergence (Cambridge, MA) 16 January 2002.

"Security and Privacy Lost",Nurturing the Cybercommons 1981-2001 (Ann Arbor, Michigan) 19-21 October 2001.

"Design for Values in Computer Science" Georgia Institute of Technology College of Computing Departmental Seminar (Atlanta, GA) September 2001.

"IT & the Developing World", Global Governance of Technology: Meeting the Needs of Developing Countries, Harvard University (Cambridge MA) April 2001.

"Internet Governance, From Meritocracy to Adhocracy to Bureaucracy", CPSR Internet Governance Workshop (Washington, D.C.) September, 1999. Presentation.

"Digital Signatures: Beware the False Simplicity of Analogy", Massachusetts Continuing Legal Education, Massachusetts Bar Association (Boston, MA) 1998.

"Issues in Electronic Commerce", NationsBank Architecture & Infrastructure Group (Charlotte, NC) 18 December 1996.

"Democratic Implications of Web Privacy", Computer Science Department Colloquium, University of Massachusetts at Amherst (Amherst, MA) November 19, 1997

"Cryptography, Privacy and Health Data", Privacy, Information Technology and Health Care, Virginia Health Policy Center, U. of Virginia (Charlottesville, VA) 24- 25 July 1996.

"Options, Opportunities & Obstacles in Electronic Commerce", Future of Electronic Banking, Columbia Institute of Tele-Information, Columbia University (New York, NY) 23 October 1996.

Panel participant, "Web Privacy & Anonymity" Symposium on Network and Distributed Systems Security (San Diego, CA) 1997.

"Internet Commerce: Evolution, Examples and Evaluation", Banking on the New Paradigm (Tokyo, Japan) December 1995

"Encryption Policy and American Economic Interests", Annual Meeting of the Association of Former Intelligence Agents, (Baltimore MA) October 1993.

to top