Curriculum Vitae

Download a Bio


EDUCATION

Doctor of Philosophy in Engineering and Public Policy
Carnegie Mellon University
August 1996
Thesis: Privacy & Reliability in Internet Commerce

Masters of Science in Electrical Engineering
University of North Carolina at Charlotte
August 1991

Bachelor of Arts in Mathematics & Bachelor of Science in Electrical Engineering
University of North Carolina at Charlotte
May 1989

CURRICULAR

Courses
Indiana University: economics of security (graduate), social informatics of security (graduate and undergraduate), introduction to computer security (freshman), organizational informatics of security (undergraduate), internship in security informatics (graduate and undergraduate)
Harvard University: security and privacy, Internet privacy, Internet commerce, information commerce, design for values, information policy, communications policy (all graduate)
Harvard & MIT: telecommunications modeling and policy analysis (graduate)
Taught: analytic frameworks; Internet strategy: law, business, policy (graduate)

Executive Education Topics

Harvard: Open source, privacy, managing security, economics of information security

Curriculum Development
Indiana University: Authored undergraduate minor in security informatics (entering class 2005), author and founding Director of Masters of Science in Security Informatics (first entering class 2009) and redesigned doctoral program adopted by faculty vote (for entering class of 2011).

EMPLOYMENT & AFFILIATIONS
Professor
School of Informatics and Computing
Indiana University
digital trust, social and economic implications of security, peer production of security

Congressional Fellow
Office of Rep. Etheridge
IEEE-USA Congressional Fellow
Jan 4, 2010 - Jan 1, 2011
portfolio: cybersecurity, defense, military construction, transportation and telecommunications. Please feel free to ask me about my IEEE-USA/AAAS fellowship experience. The most common description I have heard from colleagues is, life-changing.

Associate Professor
School of Informatics & Computing
Indiana University
August 2004 - present
digital trust, social and economic implications of security

Associate Professor
Kennedy School of Government
Harvard University
May 2002 - May 2004
digital trust, networked risk, values in as embedded in digital technology.

Visiting Scientist
Advanced Network Architecture Group
Laboratory for Computer Science
Massachusetts Institute of Technology
January 2003 -May 2003 (spring semester, Harvard research leave)
embedded values in network protocols.

Visiting Scholar
Centre for Philosophy and ICT
Erasmus University
May 2003- August 2003. (summer semester, Harvard research leave)
construction of identity through digital identifiers in the Netherlands and European Community.

Assistant Professor
Kennedy School of Government
Harvard University
November 1997 - May 2002
interdisciplinary trust research, design for values.

Senior Member of the Technical Staff
Infrastructure & Network Research
Sandia National Laboratories
Livermore, CA
September 1996 - November 1997
meta-computing, trust, clustering, computer security.

Research Assistant
Department of Engineering and Public Policy
Carnegie Mellon University
Pittsburgh, PA
August 1993 - August 1996
analyzed Internet commerce systems along the axes of reliability, privacy and security; my research moved the frontier of the conflict between reliability, which requires logging, and privacy. work resulted in two patents.

Research Assistant
Software Engineering Institute, Computer Emergency Response Team
Carnegie Mellon University
Pittsburgh, PA
May 1993 - August 1993
policy research assistant; evaluated the state of case law and statutory law with respect to the needs of system operators

Research Assistant
Information Networking Institute
Carnegie Mellon University
Pittsburgh, PA
August 1991 - May 1993
developed teaching materials and a case study in telecommunications management

Patricia Harris Fellow
Optical Interconnects & Computer Generated Holography Laboratory
University of North Carolina at Charlotte
Charlotte, NC
August 1989 - August 1991
evaluated guided wave and free space mechanisms for interconnects of multi-chip modules; designed optical devices on silicon using simple modifications of standard layout tools

Assistant Maintenance Engineer
Catawba Nuclear Station
Duke Power Company
Rock Hill, SC
August 1988 - August 1989
implemented and developed preventive maintenance programs; system responsibilities included in-core thermocouples and fire protection; assured regulatory compliance

to top

HONORS & ACTIVITIES

Honors
IEEE/AAAS Congressional Fellow, 2010.
IEEE-USAB CCIP Member 2000-present.
Member USACM Executive Council.
President & Chair of the President of the International Financial Cryptography Association. 2003 - present.
Board of Governors, IEEE Society for the Social Implications of Technology, elected 2003 - 2006.
Dean's Leadership Committee, Carnegie Institute of Technology, 2002 - 2004.
Director, Computer Professionals for Social Responsibility 1999 - 2003.
Five Year Program Review Committee of the National Science Foundation CAREER Program 2001.
Renaissance Weekend participant.
Senior Member of the IEEE, elected in September 1999.

to top

Keynotes & Plenary Presentations
"Policy Issues in Identity Management", Identity Management in an Open Society, US Department of State, Meridian Conference Center, 20 November 2009
"Design for Trust in Ambient & Ubiquitous Computing", Sixth International Conference on Ubiquitous Intelligence and Computing, (Brisbane, AU) 6-8 July 2009.
"Hardening the Network from The Friend Within", 14th Australasian Conference on Information Security and Privacy (Brisbane, AU) 4-6 July 2009.
(Plenary) "Possible Policies for the Final Eights", ARIN XXIII (San Antonio, TX) 26-29 April 2009.
"IPv6 Adoption in Autonomous Systems and Advertised Routers", RIPE 56 (Berlin, DE) 5-9 May 2008. (Plenary)
"IPv6 Diffusion Through the Lens of Economics of Security", ARIN XXI (Denver, CO) 7 April 2007. (Plenary)
"Identity in Context", IBM Identity Management Summit, (Victoria, BC Canada) April 2004.
"Unintended Consequences of Design", The International Society for Optical Engineering (SPIE) Photonics East (Boston MA) 5-8 November 2000. (Plenary)
"When Data = Death, Security for Medical Information Systems", The IEEE Information Technology Applications in Biomedicine Third International Conference (Arlington VA) 9-10 November 2000.

to top

Appointments & Affiliations

Indiana University Representative, Institute for Information Infrastructure Protection, 2006-2009; 2012-2013.
Visiting Scientist, Dept. of Computer Science, University City London, Summer 2007. Member, ACM Task Force on Job Migration, 2004 – 2005.
National Research Council and Election Assistance Commission, Technical Workshop for Chief Technology Officers, June 2005.
Member, ACM Task Force on Job Migration, 2004 - 2005.
Selected participant, CRA-W Cohort for Associate Professors Project, June 2005.
Affiliate, National Center for Digital Government, 2001- 2004.
Visiting Professor, Erasmus University, summer 2003.
Visiting Scientist, Laboratory for Computer Science, MIT (spring semester, research leave).
Editorial Board, International Journal of Technology Policy and Management 1999 - present.
IEEE Committee on Communications and Information Policy (CCIP) 1999 -present.
Member USACM 1996-present.
Research Affiliate, Internet and Telecom Convergence Consortium, MIT.
Visiting Professor, Centre for Computing and Social Responsibility, UK, summer 2001.
Granted Educational Leave with Benefits, Duke Power Company 1989.

to top

Professional Service
Editorial Board, International Journal of Technology Policy and Management, 1999-current.
Editorial Board, I/S: A Journal of Law and Policy for the Information Society
NSF Social, Behavioral and Economic; CISE; Education inclusive 2001 - present.
NSF SBIR, STTR proposal reviewer, intermittent 1995 - 2005.
Economic & Social Research Council Reviewer, United Kingdom, 2003 - 2004, 2010- present.
Reviewer: Communications of the ACM, IEEE Transactions on Computing, Mgt. Science, RAND Journal etc.
Special Issue Editor: Designing Across the Digital Divide, The Journal of Information, Communication and Ethics in Society (ICES). Vol. 1, No. 3. May 2003.
Special Issue Editor: Usable Privacy and Security, IEEE TEchnology and Society, March 2007.
Special Issue Editor: Cybersecurity, I/S A Journal of Law and Policy for the Information Society. Winter 2006.
Special Issue Editor: Cybersecurity, I/S A Journal of Law and Policy for the Information Society. Winter 2007.

to top

Program Chair

Workshops for IEEE Symposium on Secuirty and Privacy, (San Francisco, CA) May 2013.

USEC 12, a workshop affiliated with Financial Cryptography 2012 Jim Blythe, co-Chair.

Security and Privacy in Medical and Home-Care Systems, a workshop affiliated with ACM CCS

The 36th Research Conference on Communication, Information and Internet Policy 26 - 28 September 2008, George Mason University School of Law, (Arlington, VA).

The I3P Workshop on Insider Threats in the Networked World an invitation-only workshop combining researchers and industry to define the parameters of the insider threat, 15 - 16 April 2008, Duke Conference Center (Durham, NC).

DIMACS Workshop on Economics of Information Security18 - 19 January 2007, DIMACS, Rutgers University, (Piscataway, NJ)
co-chair: Alessandro Acquisti.

The Fourth Workshop on Economics of Information Security (WEIS05) , 1-3 June 2005, Kennedy School of Government, Harvard University (Cambridge, MA)
General Chair: Allan Friedman.

The Voting, Vote Capture, and Vote Counting Symposium, a one day event on design of process, technology and their interaction in voting systems. June, 2004 Kennedy School of Government, Harvard University (Cambridge, MA).
General Chair: Allan Friedman.

Identity: The Civic Scenario a two day workshop on the role of identifiers in digital government. April 2003 Kennedy School of Government, Harvard University (Cambridge, MA).

CPSR Annual Meeting 2002, Shrinking World, Expanding Net: Designing Technology for Developing Nations 5 October 2002 (Cambridge, MA)
Also General Chair.
to top

Program Committees
WEIS 2013, TRUST 2013, Cyber security Research Ethics Dialogue and Strategy (CREDS) 2013, IEEE Big Data 2013, USEC 2013, PETools2013

PETS 2012, SOUPS 2012, TRUST SES 2012, WEIS 2012, WSCS a IEEE Security & Privacy Workshop.

ETHICOMP 2011, WEIS 2011, CFP Research Track 2011, PETS 2011.

Financial Cryptography and Data Security 2010 (FC10), Workshop on Economics of Information Security (WEIS 2010), 4th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2010. All others refused due to sabbatical.

Third IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2009); Symposium on Usable Privacy and Security (SOUPS 2009); Workshop on the Economics of Security (WEIS 2009); Security Measurement and Metrics (MetriSec2009); 2009 World Congress on Privacy, Security, Trust and the Management of e-Business (CONGRESS09);ACM Computer and Communications Security Conference (ACM CCS).

ACM Computer and Communications Security Conference (ACM CCS 2008); Seventh Workshop on the Economics of Information Security (WEIS 2008); Fourth Quality of Protection Workshop (QoP 2008); The Tenth ETHICOMP International Conference on the Social and Ethical Impacts of Information and Communication Technology (ETHICOMP 2008); Third Annual APWG eCrime Researchers Summit. ECrime 2008

Sixth Workshop on the Economics of Information Security (WEIS 07); Privacy Enhancing Technologies Workshop 2007 (PETS 2007); Dependability and Security in e-Government (DeSeGov 2007); ETHICOMP 2007.

iTrust 2006; The Fifth Workshop on the Economics of Information Security (WEIS 06); Workshop on the Economics of Securing the Information Infrastructure; Workshop on Privacy in the Electronic Society (WPES 2006); Workshop on Digital Rights Management (DRM 2006); Second European Conference on Mobile Goverment (EURO Mgov 2006).

Workshop on Privacy Enhancing Technologies; Workshop on Digital Rights Management Systems, 2005; (WPES) 2005; ETHICOMP 2005.

Workshop on Digital Rights Management Systems, 2004; Privacy Enhancing Technologies (WPES) 2004; ITS European Regional Conference 2004; ETHICOMP 2004; Third Workshop on the Economics of Information Security (WEIS 04).

Workshop on Digital Rights Management Systems, 2003; Fifth International Conference of Electronic Commerce, 2003; Privacy Enhancing Technologies, 2003; ETHICOMP 2003; Second Workshop on the Economics of Information Security (WEIS 03).

Telecommunications Policy Research Conference, 2001; Inaugural Workshop on the Economics of Information Security.

The Internet and Society, Harvard University, 2000; Telecommunications Policy Research Conference 2000.

Organizing Committee: IEEE CCIP "The Evolution of the US Telecommunications Infrastructure over the Next Decade", Ithaca, NY. "Governing the Commons: Future of Global Internet Administration Conference", sponsored by Computer Professionals for Social Responsibility 1999.

to top

AWARDS
Awards $10,000 or less not listed. PI unless otherwise noted.
DARPA, Hardening the Safeware Defined Network, $0.91M, Jan. 2012- Jan. 2014.
NSF, Safe@Home, $50,000, Aug. 2012- July 2013.
DHS, Coordinating User and Technical Security, $2.4M, 2012- 2015.
NSF, Human-Centered Mitigation of the Insider Threat, $99,939, Aug. 2012 – Aug. 2013.
Cisco Research Award, Internet Economics, $30,000, November 2009 - November 2010. NSF, Intelligent Interactions for Risk Communication, $112,000, Aug. 2009- August 2011.
ARIN, "IPv4 Exhaustion, a Policy Analysis", $47k, September 2009.
NSF, "HCC: Privacy in Home-Based Ubicomp", $821k August 2007-August 2010.
Google, "Net Trust Open Source Development", $40k January 2007.
Google, "Net Trust and Trust on the Web", $37k January 2006.
DHS; I3P "Business Rational for Cybersecurity", $198k May 2007 - May 2009.
DHS; I3P "Insider Threats to Networked Security", $370k April 2007 -March 2009.
NSF Career Award, "Design for Values", $300k 2000 - 2004.
NSF "Digital Identity: The Civic Scenario", $79k January 2003 - December 2003
NSF Small Grants for Exploratory Research, "The Virtual citizen: Identity, Autonomy and Accountability", $23k May 2002 - May 2003.
East Asia Center grant, "A Study of Malaysian Internet and Telecommunications Policy", $25k July 2001 - July 2002.
Provost's Innovation Fund Grant Summer 1999, "Virtual Information Technology Research Center", $25k January 2000 - January 2001.
Dean's Research Fund "Development of an Information Technology Policy Curriculum", $10k January 1999 - January 2000.

to top

PUBLICATIONS

Books

Jim Blythe, Sven Dietrich, & L. Jean Camp (Eds.), LNCS 7398: FC 2012 Workshops, USEC and WECSR 2012, Springer (NY, NY) 2012.

L. Jean Camp, Trust & Risk in Internet Commerce, MIT Press, Winter (Cambridge, MA) 2000.

L. Jean Camp & Stephen Lewis, "The Economics of Information Security" Kluwer Academic Press, 2004.

L. Jean Camp & M. Eric Johnson, "Financial and Medical Identity Theft" Springer 2011

to top

Book Chapters
Timothy Kelley & L Jean Camp, Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections<\q>, Selected Papers from WEIS 2012, Springer (Berlin, DE) Ch. 8 pp 159-184. (Previous version published in WEIS, see D-40)

Andrew Patrick and L Jean Camp, "Risk Mitigation From the Release of Personal Identity Information", Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards. IGI Global. 2011

J. Duncan & L. Jean Camp, "The Portal Monitor: A Privacy-Aware Event-Driven System for Elder Care" Rocker, C., Ziefle, M. (Eds.) Smart Healthcare Applications and Services: Developments and Practices. IGI Publishing (Niagara Falls, NY) 2010

L. Jean Camp & Kay Connelly, "Privacy in Ubicomp" Digital Privacy: Theory, Technologies and Practices eds. Alessandro Acquisti, Sabrina De Capitani di Vimercati, Stefanos Gritzalis and Costas Lambrinoudakis, Taylor & Frances. (New York, NY (2007) Previous Version Available,

L. Jean Camp "Varieties of Software and their Implications for Effective Democratic Government", Oxford University Press (Oxford, UK) 2006.

Allan Friedman & L Jean Camp, "Security in Peer to Peer Systems", The Handbook of Information Security ed. Hossein Bidgoli, John Wiley & Sons (Hoboken, New Jersey) 2004.

L. Jean Camp & Ka-Ping Yee "Human implications of technology", Practical Handbook of Internet Computing ed. M. P. Singh, CRC Press (New York, NY) Winter 2003.

L. Jean Camp Peer to Peer Systems, The Internet Encyclopedia ed. Hossein Bidgoli, John Wiley & Sons (Hoboken, New Jersey) 2003.

L. Jean Camp, "Design for Trust", Trust, Reputation and Security: Theories and Practice, ed. Rino Falcone, Springer-Verlang (Berlin) 2003.

L. Jean Camp & Carlos Osorio,"Privacy Enhancing Technologies for Internet Commerce", Trust in the Network Economy, Springer-Verlag (Berlin) 2003.

L. Jean Camp, Cathleen McGrath & Helen Nissenbaum, "Trust: A Collision of Paradigms", Proceedings of Financial Cryptography, Lecture Notes in Computer Science, Springer-Verlag (Berlin, Germany) Fall 2001. Slides and notes from the conference available.

L. Jean Camp, "The Shape of the Network", Governance in a Globalizing World, ed. J. Donahue, Brookings Press (Washington, DC) Summer 2001.

L. Jean Camp & Y.T. Chien, "The Internet as Public Space: Concepts, Issues and Implications in Public Policy", Readings in Cyberethics, eds. R. Spinello and H Tavani, Jones and Bartlett Publishers (Sudbury , MA) January 2001. Previously published in ACM Computers & Society, September 2000. Previous version available

L Jean Camp, "The Post-Convergence Consumer", Creative Destruction, ed. Lee McKnight, MIT Press, Winter (Cambridge, MA) 2000.

L. Jean Camp, "Community Considered", democracy.com? Governance in a Networked, World Hollis Publishing (Hollis, NH) 1999.

L. Jean Camp, D. Riley, "Bedrooms, barrooms & board rooms on the Internet: the failure of media types in cyberspaces", Selected Papers from the 1996 Telecommunications Policy Net Trust and Trust on the Web, Research Conference, eds. G.L. Rosston & D. Waterman; Lawrence Earlbaum Associates (NY, NY) 1997. A previous version presented at Virtue & Virtuality: A Conference on Gender, Law and Cyberspace, MIT Cambridge, MA, 19-20

L. Jean Camp, "The systers mailing list", Wired Women: Gender and New Realities in Cyberspace, eds., L. Cherny & E. Weise, The Seal Press, (Seattle, WA) January 1996.

M. Feldman, L. Jean Camp, J. Stack & J. Morris, "Optical interconnects", Chapter 7: Design Issues in Optical Computing, ed. John Lee, Cambridge University Press (Cambridge, MA) 1993.

to top

Journals
V. Garg, and L. Jean Camp, Heuristics and Biases: Implications for Security Design, IEEE Technology & Society, Mar. 2013.

Lesa Huber, Kalpana Shankar, Kelly E. Caine, Katherine H. Connelly, L. Jean Camp, Beth Ann Walker, and Lisa Borerro. In-home Technologies and Caregiver Relationships, International Journal of Human-Computer Studies, 29 (7), 441-455 (2013).

V. Garg, and L. Jean Camp, K. Connelly,
Gandhigiri in Cyberspace: A Novel Approach to Information Ethics, ACM SIGCAS Computers & Society, 42 (2): 9-20 (2012).

V. Garg, L. Huber, L. J. Camp, K. Connelly, Risk Communication Design for Older Adults, Gerontechnology 2012; 11(2).

Caine, K. E., Zimmerman, C. Y., Schall-Zimmerman, Z., Hazlewood, W. R., Camp, L. J., Connelly, K. H., Huber, L. L, & Shankar, K, 2011, DigiSwitch: A device to allow older adults to monitor and direct the collection and transmission of health information collected at home. Journal of Medical Systems Vol. 35, No. 5, 1181-1195.

Zheng Dong & L Jean Camp, 2011, The decreasing marginal value of network size, ACM SIGCAS, Vol. 41 (1).

Debin Liu, Ninghui Li, XiaoFeng Wang, and L. Jean Camp, (accepted 2011), Security Risk Management using Incentives<\q>, IEEE Security & Privacy.

L. Jean Camp, "Re-conceptualizing the Role of Security User", Daedalus (accepted) 2011.

K. Shankar, Camp, L.J, Lorenzen-Huber, L, Connelly, K, "Aging, Privacy, and Home-Based Computing: Designing for Privacy", IEEE Pervasive Computing (accepted) 2011.

Lorenzen-Huber, L. Boutain, M., Camp, L.J., Shankar, K., Connelly, K., "Privacy, Independence, and Relationships: Older Adults Perceptions of Home-Based Ubiquitous Technologies", Ageing International (accepted) 2010.

Debin Lui, Jean Camp, XiaoFeng Wang, "Using Budget-Based Access Control to Manage Operational Risks Caused by Insiders", Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Vol 1, No 1 (2010) Previously version published at MIST 2010.

Debin Liu, XiaoFeng Wang and L. Jean Camp, "Game Theoretic Modeling and Analysis of Insider Threats", International Journal of Critical Infrastructure Protection (IJCIP) accepted (Previously presented at IFIP International Conference on Critical Infrastructure Protection, March 16-19, 2008, Washington, D.C.)

Alex Tsow, Camilo Viecco, and L. Jean Camp, Privacy-Aware Architecture for Sharing Web Histories, IBM Systems Journal, accepted.

L. Jean Camp, Net Trust: Signaling Malicious Web Sites, I/S A Journal of Law and Policy in the Information Society, 2007, Vol. 3, No 2: 211-235.

L Jean Camp, "Mental Models of Security," IEEE Technology & Society, 2009) No 3:28, IEEE, Pages: 37-46..

L Jean Camp, "Economics of Information Security" I/S A Journal of Law and Policy in the Information Society, Vo. 2, No. 2., pp 190-205.

L Jean Camp, "Digital Identity," IEEE Technology & Society, 2004, Vol. 23, No 3 pp. 34 - 41. Previous version available.

L. Jean Camp & Charles Vincent, "Looking to the Internet for Models of Governance" Ethics and Information Technology, 2004, Vol. 6, No. 3, pp. 161-174.

L. Jean Camp, Fu-Shoun Mao & Mridul Chowdhury, "Thailand at the Crossroads in ICTs" International Journal of Technology Policy and Management. Vol. 4, No. 2, pp. 116-135.

L. Jean Camp, "Principles for Design of Digital Rights Management Systems"IEEE Internet ComputingVol. 6, No. 3 pp. 59-65, May 2003. Previous version available as "DRM Doesn't Really Mean Copyright" in the peer-reviewed Proceedings of the 2003 ACM Conference on Computer and Communications Security, ACM Press (NY NY).

L. Jean Camp, "Code, Coding and Coded Perspectives", Journal of Information, Communication and Ethics in Society Vol. 1, Jan. 2003, pp. 49-59. (Previously published in the abstract-refereed conference "Code, Coding, and Coded Perspectives", Association of Internet Researchers, Lawrence , Kansas, September 2000.)

L. Jean Camp & Serena Syme,"The Governance of Code: Open Land vs. UCITA Land" ACM SIGCAS Computers and Society, September 2002, Vol. 32, No. 3.
Also available at The ACM Computers and Society Page

L. Jean Camp, "An atomicity-generating layer for anonymous currencies", IEEE Transactions on Software Engineering, March 2001, Vol. 27, No. 3, pp. 272-278.

L. Jean Camp & Serena Syme, "A Coherent Intellectual Property Model of Code as Speech, Embedded Product, or Service", Journal of Information Law and Technology, Vol. 2, 2001.

L. Jean Camp & Y.T. Chien, "The Internet as Public Space: Concepts, Issues and Implications in Public Policy", ACM Computers & Society,Vol. 30, No. 3, September 2000. (Also selected for inclusion in Readings in Cyberethics as noted above.)

L Jean Camp & Ken Lewis, "Code as Speech: a discussion of Bernstein v. USDOJ, Karn v. USDOS, and Junger v Daley in light of the U.S. Supreme Court's shift to Federalism",Ethics and Information Technology, March 2001. Vol. 1, No. 2, pp. 1-13. (Earlier version presented at CEPE 2000:Computer Ethics: Philosophical Inquiry, Dartmouth College Hanover, NH (USA) 13-16 July 2000, an abstract-referred conference. Draft version available.)

L. Jean Camp, "The World in 2010: Many New Entrants", info: the journal of policy, regulation and strategy for telecommunications, information and media, Vol. 2 No. 2, April 2000, 167-186.

L. Jean Camp & Brian Anderson, "Deregulating the Local Loop: The Telecommunications Regulation Path Less Chosen as Taken by Bangladesh" , International Journal of Technology Policy and Management Vol. 1, Issue 1. Earlier version presented at INET 2000.

L. Jean Camp & Rose Tsang, "Universal service in a ubiquitous digital network", Journal of Ethics and Information Technology, accepted. Previous version presented at INET 1999, an Internet Society abstract-refereed conference .

L. Jean Camp, "Democratic Implications of Internet Protocols" The Information Society, Vol. 15, 249 -256, 1999. Previous version presented by invitation at DIMACS Workshop on Design for Values: Ethical, Social and Political Dimensions of Information Technology, February 28 - March 1, 1998; Princeton University, Department of Computer Science, Princeton NJ. Initial version presented as "Privacy on the Web", at the peer-referred conference Symposium on Network & Distributed System Security, 10-11 February 1997, San Diego, CA.

L. Jean Camp & Marvin Sirbu, "Critical issues in Internet commerce", IEEE Communications, May, 1997.

L. Jean Camp, "Privacy: from abstraction to applications", Computers & Society, Sept. 1994, Vol. 24, No. 3, 8-15.

L. Jean Camp & J. D. Tygar, "Providing auditing and protecting privacy", The Information Society, March 1994, Vol. 10, No. 1, 59-72

L Jean Camp, R. Sharma & M. Feldman, "Guided-wave and free-space optical interconnects for parallel-processing systems: a comparison", Applied Optics, 10 September 1994, 6169-6180. Also presented at the Optical Society of America's Annual Meeting, November 1990, Boston MA.

to top

Peer Reviewed Conferences



Vaibhav Garg, Sameer Patil , Apu Kapadia, and L Jean Camp, "Peer-produced Privacy Protection: A Common-pool Approach", The IEEE International Symposium on Technology and Society (ISTAS) (Toronto, ON) 27-29 July 2013.

K. Benton, V Garg and L. Jean Camp, "Studying the Effectiveness of Android Application Permissions Requests", Security and Social Networking SESOC 2013, PerCom 2013 Workshop (San Deigo, CA) 18 March 2013.

Majid Arianezhad, L. Jean Camp, Timothy Kelley, and Douglas Stebila. "Comparative eye tracking of experts and novices in web single sign-on," 3rd ACM Conference on Data and Application Security and Privacy (CODASPY) 2013. ACM Press, 2013. available at http://eprints.qut.edu.au/55714/.

Vaibhav Garg & L Jean Camp, "Macroeconomic Analysis of Malware", NDSS (San Diego, CA) 24-27 February 2013, extended abstract.

Timothy Kelley & L Jean Camp, "Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections", WEIS, 25-26 June 2012, Berlin, DE. (Later version published in Selected Papers from WEIS 2012, Springer (Berlin, DE) 2012.)

T. Kelley, D. Stebila, & L. Jean Camp, "Self-Identified Experts Lost on the Interwebs", LASER 2012 : Learning from Authoritative Security Experiment Results, (Arlington, VA) 18-19 July 2012

Zheng Dong and L. Jean Camp, "PeerSec: Towards Peer Production and Crowdsourcing for Enhanced Security", HotSec (Bellevue, WA) 7 August 2012.

Zheng Dong, Vaibhav Garg, Apu Kapadia and L. Jean Camp, "Pools, Clubs and Security: Designing for a Party Not a Person", New Security Paradigms Workshop (Bertinoro, Italy) 19-20 September 2012.

L. Jean Camp & J. Duncan, "Conducting an Ethical Study of Web Traffic", 5th Workshop on Cyber Security Experimentation and Test, A USENIX Security Symposium Workshop, (Bellevue, WA) 6 August 2012.

Vaibhav Garg, L Jean Camp and Kay Connelly, "Risk Communication Design: Video vs. Text", PETS (Vigo, Spain) 11-13 July 2012.

Greg Norcie, Kelly Caine and Jean Camp, "Eliminating Stop-Points in the Installation and Use of Anonymity Systems: A Usability Evaluation of the Tor Browser Bundle", 5th Workshop on Hot Topics in Privacy Enhancing Technologies: HotPETs 2012 (Vigo, Spain) 13 July 2012.

J. Blythe & L. Jean Camp, "Implementing Mental Models", Semantic Computing and Security, An IEEE Symposium on Security and Privacy (SP) Workshop (San Francisco, CA) 24 May 2012

Kalpana Shankar , Lesa Huber. L.Jean Camp, Kelly E. Caine, and Katherine H. Connelly. "Finding the Older User in Home-Based Computing Studies", Society on Gerontechnology International Symposium of Automation and Robotics in Construction (ISG*ISARC 2012) (Eindhoven, NL) 26-29 June 2012.

Huber, L., Camp, L.J., Garg, V., Borrero, L. (2012). "Staying safe online: How to protect your money and your privacy", Association for Gerontology in Higher Education 38th Annual Meeting (Arlington, VA) 23-26 February 2012.

Zheng Dong and L. Jean Camp, "Policy Proposal: Limit Address Allocation to extend the Lifetime of IPv4 in the APNIC Region", ACM ACSAC Workshop on Governance of Technology, Information, and Policies (GTIP 10), 6-10 Dec. 2010 (Austin, TX).

V, Garg, N. Husted & L. Jean Camp, The Smuggling Theory Approach to Organized Digital Crime<\q>, APWG eCrime Researchers Summit (San Diego, CA) 8-9 November 2011. Best Paper Award.

V. Garg & L. Jean Camp, Privacy, Ubicomp, and Older Adults, Workshop on Security and Human Behavior", (Carnegie Mellon, PA) 17-18 June 2011.

J. Blythe, L. Jean Camp & V. Garg, "Targeted Risk Communication for Computer Security", 2011 International Conference on Intelligent User Interfaces, (Palo Alto, CA) 13-16 February 2011.

Zack Zimmerman & L Jean Camp, "Elder-friendly Design Effects on Acceptance of Novel Technologies", Elderly Interaction Design CHI; CHI 2010 Workshop, (Atlanta GA.) 4 April 2010.

V. Garg & L. Jean Camp, "How Safe is Safe Enough: The Online Version", Workshop on Security and Human Behavior, (Cambridge, UK) 28-29 June 2010.

A. Nematzadeh & L.Jean Camp, "Threat Analysis of Online Health Information System", Proceeding of 3rd International Conference on Pervasive Technologies Related to Assistive Environments, 2010 (Samos, GR) 23-25 June 2010.

Jean Camp, Rui Wang, & Xiaoyong Zhou "Four Paths Forward for IPv6 Adoption", Second International Symposium on Global Information Governance (ISGIG), Conflict and Collaboration in Compliance, Governance and Risk (Prague) 15-16 September 2009.

J. Duncan, L. Jean Camp & William R. Hazlewood "The Portal Monitor: A Privacy-Enhanced Event-Driven System for Elder Care", Persuasive 2009 (Claremont, CA) 26-29 April 2009.

Camillo Viecco & L Jean Camp, "A Risk-Based Approach to Limit the Effects of Covert Channels for Internet Sensor Data Aggregators for Sensor Privacy", IFIPTM09: IFIP International Conference on Trust Management, (West Lafayette, IN) June 15-19, 2009

Debin Liu, L Jean Camp & XiaoFeng Wang, "Mitigating Insider Threats with Incentives", Financial Cryptography and Data Security, (Barbados, BWI) 23-26 February 2009.

Hillary Elmore, L Jean Camp & Brandon Stephens, IPv6 Diffusion, WEIS 2008, 22-25 September 2008 (New Haven, CN).

Alex Tsow, Faraneh Asgarpour & L. Jean Camp Usability Analysis and User Trust Behaviors of a Social Networking Toolbar, APWG eCrime Researchers Summit (Pittsburgh, PA) 4 -5 Oct. 2007.

Farzeneh Asgapour, Debin Liu and L. Jean Camp, Risk Communication in Computer Security using Mental Models, WEIS 2007, (Pittsburgh, PA) 5-6 June 2007.

Farzeneh Asgapour, Debin Liu and L. Jean Camp, "Mental Models of Computer Security Risks: Experimental Results", Usable Security 07, (Tobago) 16 February 2007.

L. Jean Camp, "Reliable Usable Signaling to Defeat Masquerade Attacks" WEIS 2006 (Cambridge, MA) 26-28 June 2006.

Debin Liu & L Jean Camp, ";Proof of Work Can Work" WEIS 2006 (Cambridge, MA) 26-28 June 2006.

L. Jean Camp, Cathleen McGrath & Alla Genkina, Security and Morality: A Tale of User Deceit, Models of Trust for the Web MTW'06, (Edinburgh, Scotland) 22 May 2006.

Serena Chan & L. Jean Camp, "Towards Coherent Regulation of Law Enforcement Surveillance in the Network Society ", Ethicomp: The Social and Ethical Impacts of Information and Communications Technologies, Technical University of Gdansk (Gdansk, Poland) 18-20 June 2001, Vol. 2 pp. 86-101. Previous version presented at The 5th International Conference on Technology, Policy, and Innovation, Delft, The Netherlands, 2001.

Serena Syme & L. Jean Camp, "The Governance of Code: Code as Governance", Ethicomp: The Social and Ethical Impacts of Information and Communications Technologies, Technical University of Gdansk (Gdansk, Poland) 18-20 June 2001, Vol. 1, pp. 86-101.

L. Jean Camp & Catherine Wolfram, "Pricing Security", Proceedings of the CERT Information Survivability Workshop, (Boston, MA) Oct. 24-26, 2000, pp. 31-39.

D. Evensky, A. Gentile, L. Jean Camp, & R. Armstrong, "Lilith: Scalable Execution of User Code for Distributed Computing", Proceedings of The 6th IEEE International Symposium on High Performance Distributed Computing, HPDC-6 (Portland, OR) August 1997, pp. 123-145.

L. Painton, T. Gaylor, L. Jean Camp, C. Phillips, G. Wyss, "Risk-based characterization of network vulnerability", CERT Information Survivability Workshop (San Diego, CA) 12 - 13 February 1997, pp. 62-64.

L. Jean Camp, Michael Harkavy, J.D. Tygar and Bennet Yee, "Anonymous atomic transactions," 2nd Annual USENIX Workshop on Electronic Commerce Proceedings (Oakland, CA) November 1996, pp. 123-134.

L. Jean Camp, M. Sirbu & J. D. Tygar, "Token and notational money in electronic commerce", USENIX Workshop on Electronic Commerce, July 1995, New York, NY, 1-12. A previous version presented at the Telecommunications Policy Research Conference (Solomons Island, MA) October 1994, pp. 1-12.

L. Jean Camp & D. Riley, "Protecting an unwilling electronic populace", Proceedings of the Fifth Conference of Computers Freedom and Privacy (San Francisco, CA) 28-31 March 1995, pp. 120-139.

L. Jean Camp & M. Sirbu, "Networking strategy at The Travelers' Insurance", Proceedings of ACM SIG in Computer Personnel Research Conference (St. Louis, MO) April 1993, pp. 450-463.

to top

Abstract-Refereed Conferences

V. Garg & L. Jean Camp, End User Perception of Online Risk Under Uncertainty, Hawaii International Conference On System Sciences, (Manoa, HI) 4-7 January 2012.

Huber, L., Borrero, L., Walker, B.A., Shankar, K., Caine, K., Connelly, K., Camp, L.J. (2011, November). How Older Adults Use Information Technology to Reduce Caregiver Burden, Gerontological Society of America 64th Annual Scientific Meeting, Boston, MA.

Huber, L.L., Camp, L.J., Connelly, K.H., Shankar, K., Caine, K., Hazlewood, W., Zimmerman, Z. "A Privacy Framework for Evaluating In-Home Technologies", Conference Proceedings, Gerontological Society of America 63rd Annual Scientific Meeting, (New Orleans, LA). 2010.

Camp, L.J., Huber, L..L., Borrero, L. "What do older adults understand about their privacy risks while online?" Conference Proceedings, Gerontological Society of America 63rd Annual Scientific Meeting, (New Orleans, LA). 2010.

Jean Camp, Four Paths Forward for IPv6 Adoption, TPRC (Arlington, VA) 28 Sept. 30 Sept. 2008.

L. Jean Camp & Debin Liu, Proof of Work {cannot, can, does currently} Work, TPRC (Arlington, VA) 28 Sept. 30 Sept. 2007.

L. Jean Camp, L. Huber, & Kay Connelly, "Designing Ubicomp with Privacy Constraints Defined by Users", Nurturing Technologies in the Domestic Environment: Feeling Comforted, Cared for, and Connected at Home, (Orange County, CA) 18 Sept. 2006. Workshop held conjunction with Ubicomp 2006.

L. Jean Camp, & Kay Connelly "Beyond Consent: Implications of Ubicomp for Privacy", TPRC 2006, (Washington, DC) 29 Sept.

L. Jean Camp, Peer Production of Privacy and Security Information Ethical Surveillance, 8-10 June 2005 (Austin TX).

L. Jean Camp, Kay Connelly, & Kalpana Shankar, Design for Privacy: Towards a Methodological Approach to Trustworthy Ubicomp Design, Ethicomp 2005, 12 -14 September, 2005 (Linkoping, Sweden).

L. Jean Camp & Allan Friedman, Peer Production of Security & Privacy Information, Telecommunications Policy Research Conference e (Alexandria, VA) 23- 25 September 2005.

Allan Friedman, Alla Genkina and L Jean Camp, Net Trust: Designing for Human Trust Perception, Trustworthy Interfaces for Passwords and Personal Information (Stanford University, Palo Alto, CA)13 June 2005.

L. Jean Camp, Warigia Bowman & Allan Friedman Voting, Vote Capture & Vote Counting Symposium, Proceedings of the 6th Annual National Conference on Digital Government Research, 15-18 May 2005 (Atlanta, GA). pp. 198 .

Jean Camp & Allan Friedman, Peer patching, 24th Army Science Conference, 28 November - 2 December 2004 (Orlando, FL)

Jean Camp, "Digital Identity", International Symposium on Technology and Society 2003--Crime Prevention and Security 24 - 26 September 2003 (Amsterdam, 2003).

L Jean Camp & Allan Friedman, "Peer to Peer Security" Telecommunications Policy Research Conference, 19-21 September 2003.

Allan Friedman & L. Jean Camp, "Making Security Manifest" Second Workshop on the Economics of Information Security, College Park, MA. May 2003.

L. Jean Camp, " 'Marketplace incentives to prevent piracy': An incentive for security?", First Workshop on the Economics of Information Security, Berkeley, CA. May 2002.

L. Jean Camp & Carolyn Gideon, "Certainty in Bandwidth or Price" The 29th Research Conference on Communication, Information and Internet Policy, Washington, D.C. Oct. 2000.

L. Jean Camp, "Code, Coding, and Coded Perspectives", Association of Internet Researchers, Lawrence , Kansas, September 2000.

L. Jean Camp, "Privacy and Security Implications of Quality of Service Mechanisms", Workshop On Internet Service Quality Economics, MIT Cambridge. MA. 2-3 December 1999.

L. Jean Camp & B. Anderson, "Expansion of Telecommunications Infrastructure in Emerging Nations: The Case of Bangladesh", Telecommunications Policy Research Conference, Alexandria, VA. 25-26 Sept. 1999.

L. Jean Camp, D.A. Evensky, "Survivability & Trust", Research Directions for the Next Generation Internet, 12-14 May 1997, Washington, DC.

to top

Editor Selected
Identity and Incentives, IEEE Security & Privacy, fall 2010.

A Life or Death InfoSec Subversion, IEEE Security & Privacy, with Camilo Viecco. November 2008.

Book review of "Power and Security in the Information Age", Information, Communication and Society, 2008

Extended Abstract: Mental Models of Computer Security, Proceedings of Financial Cryptography 2004, Lecture Notes in Computer Science, Springer-Verlag (Berlin) September 2004.

J. Camp "Access Denied" IEEE Security & Privacy vol. 1, no. 5, Sept./Oct. 2003, pp. 82-85.

"A Review of Financial Cryptography," CIPHER, Issue 42, May 1, 2001.

"A Review of the Seventh Financial Cryptography," CIPHER, April 2003.

Internet Voting is No Solution, Belfer Center for Science and International Affairs. November 28, 2000.

Editorial, "Computer Attacks have focused on the wrong issues," Boston Globe. February 17, 2000

Book review: "The Internet Economy: Access, Taxes, and Market Structure. by Alan Wiseman", Brookings Institution Press, 2000, pp. 128

L. Jean Camp & Brain Anderson, "Grameen Phone: Empowering the Poor through Connectivity", iMP: The Magazine on Information Impacts (December 1999).

L. Jean Camp, "Why do Phil’s travails matter?", IEEE IMPACT, August 1995: 1.

L. Jean Camp, "Cryptography policy needs another look", IEEE Spectrum, June 1994, 15-16.

Additional Writings
Voting and Vote Counting: The Annotated Best Practices, Institute of Politics, Harvard, (Cambridge, MA) July 2004. Distributed as model research by Kennedy School of Government of Harvard Universiy to all attendees of the Democratic National Convention.

Identity in Digital Government: A Research Agenda, Harvard, Nov. 2003. Over 200 copies distributed by the National Science Foundation and the Kennedy School of Government.

Special Issue Editor: Designing Across the Digital Divide, The Journal of Information, Communication and Ethics in Society (ICES). Vol. 1, No. 3. May 2003.

R. Morris & L. Jean Camp, "Wine on the Wire: Press Coverage of Internet Commerce", Shorenstein Center on the Press, Politics, & Public Policy Computer Security Mental Models of Experts and non-Experts Working Paper Series, 6 Feb. 1999.

to top

Selected Presentations & Panels
"Enabling Trustworthy Users" Microsoft Research (Redmond, WA), January 2012.

"Translucent Security", School of Computer Security Seminar Series, University of North Carolina Charlotte, (Charlotte, NC) 3 May 2011.

"Human Behaviors and Security", Cyber Security: Exploring the Human Element; National Press Club, (Washington, DC) 8 March 2011.

"People Taking Risks Online", Security and Human Behaviors, (MIT, Cambridge MA) 11 June 2009.

"Online Economics Behaviors: Taking Risks", Security Economics Workshop (London, UK) 26 June 2009.

"Exactly What Is it That You Will Never Admit? Challenges to User-Centered Research in Privacy", Privacy Methodologies Workshop (London, UK) 23 - 24 March 2009

"Economics of Security: What is Next?", Financial Cryptography (Christ Church, Barbados) 25 Feb. 2009.

Security@Home Sun Microsystems Intellectual Desserts (Menlo Park, CA) 13 November 2008.

Security & Elders, IPSI Public Lecture Series, University of Toronto (Toronto CN) 10 Nov. 2008.

Security & Human Behavior, Interdisciplinary Studies in Information Security (Monte Verita, SW),7-11 July 2008.

Mental Models of Security Security & Human Behavior, (MIT Cambridge MA) 2-3 July 2008.

The Inadvertent Insider: Communicating Security Risks, The Insider Threat in the Networked World, (Durham, NC) 15-16 April 2008.

IPv6 Diffusion: Learning from Economics of Security, CISCO Workshop on the Future of Internet Addressing, (Milpitas, CA) 4 March 2008. with Hillary Elmore.

Communicating Security State using Net Trust, Google Research Seminar, (Mountain View, CA) 28 February 2008. with Brandon Stephens

"Privacy in ubiquitous and home computing", University City London / British Telecom Computer Science Seminar, (Ipswich, UK) 1 August 2007.

"Computer Security and Human Trust Behaviors", 2007 Decision and Risk Analysis Conference: Convergence Between Finance and Industry (Dallas, TX) 22-23 May 2007.

"Net Trust: A Status Report", Symantec Research Seminar (Mountain View, CA) 4 May 2007.

"Trust and Trusted Computing", Usable Security (Tobago, BWI) 16 February 2007.

"Games, Privacy, Identity: The Coming Collision of Virtual & Real", Financial Cryptography (Tobago, BWI) 14 February 2007.

"Defeating Spam One Account at a Time", Money Finance and Growth: XV International Tor Vergata Conference on Banking and Finance, Faculty of Economics (Rome, IT) 13 December 2006.

"Net Trust: Embedding Identity in Social Context", Oxford Internet Institute Research Seminar, (Oxford, UK) 7 December 2006.

"Economics of Identity", 7th Annual Privacy and Security Workshop: Your Identity Please: Identity Theft and Identity Management in the 21st Century, Toronto School of Law (Toronto, CN) 2-3 November 2006.

"Economics of Security as Design Parameters", School of Information Research Seminar, University of Michigan, (Ann Arbor, MI) 26 October 2006.

"Beyond Usable Security: A Matter of Trust, An Issue of Risk" Workshop on Future Directions for NSF Cyber Trust Program (Pittsburgh, PA) 5-7 October, 2006.

"Hard Wired Identity", Oxford Internet Institute (Balliol College, Oxford, UK) 29 Sept. 2006.

"Open Code, Free Software, and Governance" Open Soource in the International Marketplace, University of Pennsylvannia School of Law Symposium (Philadelphia, PA) 31 March 2006.

"Forging Trust Using Reliable Economic Signals" CERIAS Annual Symposium, (West Lafayette, IN) 22 March 2006.

Human Autonomy in an Age of Active Aware Pervasive Computing, AAAS Annual Meeting (Chicago, IL) 16-20 February 2006.

Net Trust Google Security Group Research Presentation, (Mountain View, CA) 3 August 2005.

Privacy in Voting, Technical Workshop for Chief Technology Officers, National Research Council and Election Assistance Commission (Washington, DC) June 2005.

Allan Friedman, Alla Genkina and L Jean Camp, Social and Network Trust, DIMACS (New Brunswick NJ) 14 - 15 April 2005.

Economics of Information Security, CFI-CIRT, BMO Financial Group (Toronto CN) 10 February 2005.

The Economics of Information Security, 13th CACR Information Security Workshop & amp; 5th Annual Privacy and Security Workshop: Privacy and Security: Seeking the Middle Path, Centre for Applied Cryptographic Research, (Toronto, Canada) October 2004.

Economics of Information Security, Second Workshop on the Economics of Peer-to-Peer Systems, Harvard University, (Cambridge, MA) June 2004.

Identity as a Social and Technical Construct, 14th IEEE-RIDE (Research Issues on Data Engineering) Workshop Web Services for E-Commerce and E-Government Applications (Boston, MA) 28 April 2004.

"Open Source, Myth Versus Reality", Massachusetts Executive Leadership Forum (Boston, MA) 15 October 2003.

Panel organized and Chaired, Privacy in Internet Commerce, International Conference on Electronic Commerce (Pittsburgh, PA) 1 - 3 October 2003.

"Identity in Digital Government; Best Practices and a Research Agenda" Max Planck Institute (Bonn, Germany) 14 July 2003.

Using Ethnographic Data to Evaluate Technical Design WebShop 2003. University of Maryland (College Park, MA) 3-5 June 2003.

"Privacy by Design: A Study in Cooperation Across Disciplines ", Workshop on Public Values, Systems Design, and the Public Domain , Sponsored by the Programme in Cooperative Media Law & Policy, Oxford. (Bellagio, Italy) 3-7 March 2003.

"Trust and Risk in Internet Commerce: Design for Trust", The Institute for Security Technology Studies, Dartmouth University (Dartmouth, NH) January 17, 2003.

"Design for Values in DRM ", MITRE (Bedford, NH) 15 November 2002.

"Thailand At the Crossroads in Telecommunications ", International Conference on Science, Technology and Innovation BCSIA, KSG. Harvard (Cambridge, MA) 23- 24 September 2002.

"Digital Rights Management as Design for Trust " Public Design Workshop , NYU Law School (NY, NY) 13-14 September 2002.

"Returning to First Principles: The Functions of Copyright as a Basis for DRM in 2002" Cryptography and Information Security Group Seminar (MIT Cambridge, MA) April 2002.

"Privacy Models and Business Plans" Internet & Telecoms Convergence (Cambridge, MA) 16 January 2002.

"Security and Privacy Lost",Nurturing the Cybercommons 1981-2001 (Ann Arbor, Michigan) 19-21 October 2001.

"Design for Values in Computer Science" Georgia Institute of Technology College of Computing Departmental Seminar (Atlanta, GA) September 2001.

"IT & the Developing World", Global Governance of Technology: Meeting the Needs of Developing Countries, Harvard University (Cambridge MA) April 2001.

"Internet Governance, From Meritocracy to Adhocracy to Bureaucracy", CPSR Internet Governance Workshop (Washington, D.C.) September, 1999. Presentation.

"Digital Signatures: Beware the False Simplicity of Analogy", Massachusetts Continuing Legal Education, Massachusetts Bar Association (Boston, MA) 1998.

"Issues in Electronic Commerce", NationsBank Architecture & Infrastructure Group (Charlotte, NC) 18 December 1996.

"Democratic Implications of Web Privacy", Computer Science Department Colloquium, University of Massachusetts at Amherst (Amherst, MA) November 19, 1997

"Cryptography, Privacy and Health Data", Privacy, Information Technology and Health Care, Virginia Health Policy Center, U. of Virginia (Charlottesville, VA) 24- 25 July 1996.

"Options, Opportunities & Obstacles in Electronic Commerce", Future of Electronic Banking, Columbia Institute of Tele-Information, Columbia University (New York, NY) 23 October 1996.

Panel participant, "Web Privacy & Anonymity" Symposium on Network and Distributed Systems Security (San Diego, CA) 1997.

"Internet Commerce: Evolution, Examples and Evaluation", Banking on the New Paradigm (Tokyo, Japan) December 1995

"Encryption Policy and American Economic Interests", Annual Meeting of the Association of Former Intelligence Agents, (Baltimore MA) October 1993.

to top