Publications


My research core interest is human-centered security and privacy. Security and privacy are the primary sources of online risk. My interest spans domains from small embedded home-based computing to SDN; from helping an elder avoid fraud to an activist avoid surveillance through malicious route manipulation. The core of my interest is the interaction of the human and the technical, empowering people by building security and privacy into the information substrate.
I have categorized my work into somewhat overlapping categories. For example, some work on risk assessment took place in the context of security for in-home computing. Usable security grounded in risk communication for network operators similarly spans multiple category.

Most recently updated is the slide set from Real World Crypto http://ljean.com/files/RealWordCryptov4.pdf

A particular favorite is security as a public good and how that can be changed by design: Reconceptualizing the Role of Security User, Daedalus 140.4 (2011): 93-107.(edited version MIT Press)

Papers by Nonexclusive Category
Mental Models & Risk Communication     Design for Trust      Human—Centered Security
Peer Production & Crowdsourcing Security     Gender Online      Security Informatics of In—Home Care
Economics of Information Security Privacy Ethics & Network Experimentation
Network Engineering E—Crime Open Code & Internet Governance
Traditional Usable Security ICT for Development Light Applied Crytpo Papers


Mental Models & Risk Communication

Vaibhav Garg, Kevin Benton, and L. Jean Camp. The Privacy Paradox: A Facebook Case Study 2014 TPRC Conference Paper. 2014.

Vaibhav Garg and L Jean Camp, Cars, Condoms, and Facebook, ISC 2013 (Dallas, Texas) 13—15 November 2013.

L. Jean Camp, Translucent Security: Security Interactions as Risk Perceptions
, Risk Perception in IT Security and Privacy (RP—IT) Workshop, A SOUPS Workshop, Newcastle upon Tyne, 26 July 2013.

K. Benton, V Garg and L. Jean Camp, Studying the Effectiveness of Android Application Permissions Requests, Security and Social Networking SESOC 2013, PerCom 2013 Workshop (San Deigo, CA) 18 March 2013.

Zheng Dong & L Jean Camp, The decreasing marginal value of network size, ACM SIGCAS Computers & Society, Vol. 41 No. 1 (2011).

V. Garg, and L. Jean Camp, Heuristics and Biases: Implications for Security Design, IEEE Technology & Society, Mar. 2013.

J. Blythe & L. Jean Camp, Implementing Mental Models, Semantic Computing and Security, An IEEE Symposium on Security and Privacy (SP) Workshop (San Francisco, CA) 24 May 2012.

Vaibhav Garg, L Jean Camp and Kay Connelly,Risk Communication Design: Video vs. Text, PETS (Vigo, Spain) 11-13 July 2012.

V. Garg, L. Huber, L. J. Camp, K. Connelly, Risk Communication Design for Older Adults, Gerontechnology Vol. 11, No. 2 (2012).

L Jean Camp, "Mental Models of Privacy and Security," IEEE Technology & Society, Vol 28 (3) 37-46.

V. Garg & L. Jean Camp, End User Perception of Online Risk Under Uncertainty, Hawaii International Conference On System Sciences, (Manoa, HI) 4—7 January 2012.

J. Blythe, L. Jean Camp & V. Garg, Targeted Risk Communication for Computer Security, 2011 International Conference on Intelligent User Interfaces, (Palo Alto, CA) 13—16 February 2011.

Farzeneh Asgapour, Debin Liu and L. Jean Camp, "Mental Models of Computer Security Risks", Usable Security 07, Financial Cryptography and Data Security Lecture Notes in Computer Science Volume 4886, 2007, pp 367—377.

Allan Friedman & L. Jean Camp, "Making Security Manifest", Second Workshop on the Economics of Information Security, College Park, MA. May 2003.

Design for Trust

L. Jean Camp, Trust & Risk in Internet Commerce, MIT Press, Winter (Cambridge, MA) 2000. Full unedited text, despite the embarassing typos, is availble here. The edited lovely volume is still on Amazon.

L. Jean Camp Peer to Peer Systems, The Internet Encyclopedia ed. Hossein Bidgoli, John Wiley & Sons (Hoboken, New Jersey) 2003.

L. Jean Camp, "Design for Trust", Trust, Reputation and Security: Theories and Practice, ed. Rino Falcone, Springer-Verlang (Berlin) 2003.

L. Jean Camp, Cathleen McGrath & Helen Nissenbaum,"Trust: A Collision of Paradigms", Proceedings of Financial Cryptography, Lecture Notes in Computer Science, Springer-Verlag (Berlin, Germany) Fall 2001. Slides and notes from the conference available.

L. Jean Camp, "The Shape of the Network", Governance in a Globalizing World, ed. J. Donahue, Brookings Press (Washington, DC) Summer 2001.

L. Jean Camp, D.A. Evensky, "Survivability & Trust", Research Directions for the Next Generation Internet, 12-14 May 1997, Washington, DC.

Human-Centered Security
Jacob Abbott, Violeta Moreno, & L. Jean Camp, Password Differences based on Language and Testing of Memory Recall, Annual Computer Security Applications Conference, (New Oleans, LA), 7-11 December 2014. (poster)

L Jean Camp, Jacob Abbott, and Siyu Chen, cPasswords: Leveraging Episodic Memory and Human-Centered Design for Better Authentication. Hawaii International Conference on System Sciences, (Kauai, HI) 5-9 Jan 2016.


Vaibhav Garg, Kevin Benton, and L. Jean Camp. The Privacy Paradox: A Facebook Case Study 2014 TPRC Conference Paper. 2014.

L. Jean Camp, Reconceptualizing the Role of Security User, Daedalus 140.4 (2011): 93-107.(edited version MIT Press)

Greg Norcie, Jim Blythe, Kelly Caine, and L. Jean Camp, Why Johnny Can’t Blow the Whistle: Identifying and Reducing Usability Issues in Anonymity Systems, USEC 14: A NDSS Workshop (San Diego, CA) 23 February 2014.

Vaibhav Garg and L Jean Camp, Cars, Condoms, and Facebook, ISC 2013 (Dallas, Tx) 13—15 November 2013.

Shankar, K., Camp, L. J., Connelly, K., Huber, L. (2012). Aging, Privacy, and Home—Based Computing: Development of a Framework for Design, IEEE Pervasive Computing, 11 (4), 46—54.

Lorenzen-Huber, L. Boutain, M., Camp, L.J., Shankar, K., Connelly, K.,Privacy, Independence, and Relationships: Older Adults’ Perceptions of Home-Based Ubiquitous Technologies, Ageing International, 36:232—252 (2011).

Farzeneh Asgapour, Debin Liu and L. Jean Camp,
"Computer Security Mental Models of Computer Security Risks"
, Usable Security 07, Financial Cryptography and Data Security Lecture Notes in Computer Science Volume 4886, 2007, pp 367—377.

L Jean Camp & Kay Connelly Privacy in Ubiquitous Computing, Digital Privacy: Theory, Technologies and Practices eds. Alessandro Acquisti, Sabrina De Capitani di Vimercati, Stefanos Gritzalis and Costas Lambrinoudakis, Taylor & Frances. (New York, NY (2007)

L. Jean Camp, Cathleen McGrath & Alla Genkina, Security and Morality: A Tale of User Deceit, Models of Trust for the Web MTW'06, (Edinburgh, Scotland) 22 May 2006.

L. Jean Camp & Ka-Ping Yee "Human implications of technology", Practical Handbook of Internet Computing", ed. M. P. Singh, CRC Press (New York, NY) Winter 2003.

Allan Friedman & L. Jean Camp, "Making Security Manifest" Second Workshop on the Economics of Information Security, College Park, MA. May 2003.

L. Jean Camp, Cathleen McGrath & Helen Nissenbaum, "Trust: A Collision of Paradigms", Proceedings of Financial Cryptography, Lecture Notes in Computer Science, Springer-Verlag (Berlin, Germany) Fall 2001. Slides and notes from the conference available.

L Jean Camp, "Digital Identity," IEEE Technology & Society, 2004, Vol. 23, No 3 pp. 34 - 41. Previous version available.

L. Jean Camp & Marvin Sirbu, "Critical issues in Internet commerce", IEEE Communications, May, 1997.

L. Jean Camp, "Privacy: from abstraction to applications", Computers & Society, Sept. 1994, Vol. 24, No. 3, 8-15.

L. Jean Camp & J. D. Tygar, "Providing auditing and protecting privacy", The Information Society, March 1994, Vol. 10, No. 1, 59-72

Peer Production & Crowdsourcing of Security

L. Jean Camp, Reconceptualizing the Role of Security User, Daedalus 140.4 (2011): 93-107.(edited version MIT Press)

Vaibhav Garg, Sameer Patil , Apu Kapadia, and L Jean Camp, Peer-produced Privacy Protection: A Common-pool Approach, The IEEE International Symposium on Technology and Society (ISTAS) (Toronto, ON) 27-29 July 2013.

Zheng Dong and L. Jean Camp, PeerSec: Towards Peer Production and Crowdsourcing for Enhanced Security, HotSec (Bellevue, WA) 7 August 2012.

Zheng Dong, Vaibhav Garg, Apu Kapadia and L. Jean Camp, Pools, Clubs and Security: Designing for a Party Not a Person, New Security Paradigms Workshop (Bertinoro, Italy) 19-20 September 2012.

L. Jean Camp & Alla Genkina, Social Networks, Phishing, eds. S. Myers and M. Jacobsson, 2006. The version before editing.

Allan Friedman & L Jean Camp, "Security in Peer to Peer Systems", The Handbook of Information Security ed. Hossein Bidgoli, John Wiley & Sons (Hoboken, New Jersey) 2004.

G. Norice & L Jean Camp, "The Price Of Privacy: An Examination of the Economic Costs of Abstention from Social Networks", 2015 Amsterdam Privacy Conference (APC 2015), 23 - 26 October 2015.

L. Jean Camp, Peer Production of Privacy and Security Information Ethical Surveillance, 8-10 June 2005 (Austin TX).

L. Jean Camp & Allan Friedman, Peer Production of Security & Privacy Information, Telecommunications Policy Research Conference (Alexandria, VA). Abstract publication. Full publication see Peer Production of Privacy and Security Information.

L. Jean Camp, Warigia Bowman & Allan Friedman Voting, Vote Capture & Vote Counting Symposium, Proceedings of the 6th Annual National Conference on Digital Government Research, 15-18 May 2005 (Atlanta, GA). pp. 198. Based on The Annotated Best Practices - A Symposium Summary of the NSF/Harvard Symposium.

L. Jean Camp & Allan Friedman, Peer patching, 24th Army Science Conference, 28 November - 2 December 2004 (Orlando, FL)

E-crime

Garg, V., & Camp, L. J. (2015). Why cybercrime?ACM SIGCAS Computers and Society, 45(2), 20-28.

K Benton, Martin Swany, and Jean Camp, Preventing Data Exfiltration via Political and Geographic Routing Policies, Telecommunications Policy Research Conference (Arlington, VA) 30 Sept. - 2 October 2016

Zheng Dong, Kevin Kane, Siyu Chen, and L. Jean Camp, The New Wildcats: High-Risk Banking From Worst-Case Certificate Practices Online, Journal of Technology Science, April 2016

P. Morano, L Jean Camp, Macroeconomic Analysis of Routing Anomalies, TPRC Conference Paper, (Arlington, VA) 2016.

Debin Liu, L. Jean Camp & XiaoFeng Wang, "Mitigating Inadvertent Insider Threats with Incentives", Financial Cryptography and Data Security, (Barbados, BWI) 23-26 February 2009.

Vaibhav Garg and L. Jean Camp, Spare the Rod, Spoil the Network Security? Economic Analysis of Sanctions Online, eCrime 2015 APWG (Barcelona, SP) 26-29 May 2015.

Vaibhav Garg Chris Kanich, and L. Jean Camp. Economic Analysis of eCrime in Crowd-sourced Labor Markets: Mechanical Turk vs. Freelancer. 11th Annual Workshop on Economics of Information Security, 2012.

Dong, Zheng, Apu Kapadia, Jim Blythe, and L. Jean Camp. Beyond the Lock Icon: Real-time Detection of Phishing Websites Using Public Key Certificates eCrime 2015 APWG (Barcelona, SP) 26-29 May 2015.

Dong, Zheng, Kevin Kane, and L. Jean Camp. Phishing in Smooth Waters: The State of Banking Certificates in the US 2014 TPRC Conference Paper. 2014.

Vaibhav Garg, Thomas Koster and L. Jean Camp,Cross-country Analysis of Spambots, EURASIP Journal on Information Security.20 October 2013, 2013:3 (doi:10.1186/1687-417X-2013-3).

Vaibhav Garg & L Jean Camp, Macroeconomic Analysis of Malware, NDSS (San Diego, CA) 24-27 February 2013, extended abstract.

Timothy Kelley & L Jean Camp, Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections, Selected Papers from WEIS 2012, Springer (Berlin, DE) Ch. 8 pp 159—184. (Previous version published in WEIS

V. Garg, L. Jean Camp & N. Husted, The Smuggling Theory Approach to Organized Digital Crime, Sixth Annual APWG eCrime Researchers Summit, (San Diego, CA) 8—9 November 2011 Best paper award.

Debin Liu & L Jean Camp, "Proof of Work Can Work" WEIS 2006 (Cambridge, MA) 26—28 June 2006.


Net Trust

L. Jean Camp & Alla Genkina, Social Networks, Phishing, eds. S. Myers and M. Jacobsson, 2006. The version before editing.

L. Jean Camp, "Net Trust: Signaling Malicious Web Sites", I/S A Journal of Law and Policy in the Information Society, Winter 2007.

L Jean Camp, "Mental Models of Security," IEEE Technology And Society Magazine, 28 (3) 37—46.

Economics of Information Security

K Benton, Martin Swany, and Jean Camp, Preventing Data Exfiltration via Political and Geographic Routing Policies, Telecommunications Policy Research Conference (Arlington, VA) 30 Sept. - 2 October 2016

Zheng Dong, Kevin Kane, Siyu Chen, and L. Jean Camp, The New Wildcats: High-Risk Banking From Worst-Case Certificate Practices Online, Journal of Technology Science, April 2016

P. Morano, L Jean Camp, Macroeconomic Analysis of Routing Anomalies, TPRC Conference Paper, (Arlington, VA) 2016.

Kevin Benton and L. Jean Camp, Firewalling Scenic Routes: Preventing Data Exfiltration via Political and Geographic Routing Policies SafeConfig 2016: Testing and Evaluation for Active & Resilient Cyber Systems, (Hofburg Palace, Vienna, Austria) October 24, 2016.

The Economics of Information Security by Kluwer.

An edited collection of reviewed papers by Camp, Varian, Anderson and Schneier. Selected papers from the Economics of Information Security Workshop Series — The First and Second Workshops.

Debin Lui, Jean Camp, XiaoFeng Wang, Using Budget-Based Access Control to Manage Operational Risks Caused by Insiders, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, (1) 1: 29—45 (2010) Previously version published at MIST 2010.

Debin Liu, XiaoFeng Wang and L. Jean Camp, Game Theoretic Modeling and Analysis of Insider Threats, International Journal of Critical Infrastructure Protection, (2008) 1:75—80

Alex Tsow, Camilo Viecco, and L. Jean Camp, Privacy-Aware Architecture for Sharing Web Histories, IBM Journal of Research & Development, IBM Systems Journal 3 (2007): 5—13.

L. Jean Camp, Reconceptualizing the Role of Security User, Daedalus 140.4 (2011): 93—107.(edited version MIT Press)

Vaibhav Garg, Thomas Koster and L. Jean Camp, Cross—country Analysis of Spambots, EURASIP Journal on Information Security, 20 October 2013, 2013:3 (doi:10.1186/1687—417X—2013—3).

Zheng Dong & L Jean Camp, The decreasing marginal value of network size, ACM SIGCAS Comput\ ers & Society, Vol. 41 No. 1 (2011).

Debin Liu, XiaoFeng Wang, and L. Jean Camp, Security Risk Management using Incentives, IEEE Security & Privacy, Vol. 9, No. 6: 20—28 (2011).

Vaibhav Garg, Sameer Patil , Apu Kapadia, and L Jean Camp, Peer—produced Privacy Protection: A Common—pool Approach, The IEEE International Symposium on Technology and Society (ISTAS) (Toronto, ON) 27—29 July 2013.

Zheng Dong and L. Jean Camp, PeerSec: Towards Peer Production and Crowdsourcing for Enhanced Security , HotSec (Bellevue, WA) 7 August 2012.

Zheng Dong, Vaibhav Garg, Apu Kapadia and L. Jean Camp, Pools, Clubs and Security: Designing for a Party Not a Person, New Security Paradigms Workshop (Bertinoro, Italy) 19—20 September 2012.

Vaibhav Garg & L Jean Camp, Macroeconomic Analysis of Malware, NDSS (San Diego, CA) 24—27 February 2013, extended abstract.

T. Kelley, D. Stebila, & L. Jean Camp, Self—Identified Experts Lost on the Interwebs, LASER 2012 : Learning from Authoritative Security Experiment Results, (Arlington, VA) 18—19 July 2012

Timothy Kelley & L Jean Camp, Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections, Selected Papers from WEIS 2012, Springer (Berlin, DE) Ch. 8 pp 159—184. (Previous version published in WEIS

Andrew Patrick & L Jean Camp, Risk Mitigation From the Release of Personal Identity Information, Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards. IGI Global. 2011, pp. 309—330.

V. Garg, L. Jean Camp & N. Husted, The Smuggling Theory Approach to Organized Digital Crime, Sixth Annual APWG eCrime Researchers Summit, (San Diego, CA) 8—9 November 2011 Best paper award.

Zheng Dong, Rui Wang, Xiaoyong Zhou, L. Jean Camp, Policy Proposal: Limit Address Allocation to extend the Lifetime of IPv4 in the APNIC Region . ACM ACSAC Workshop on Governance of Technology, Information, and Policies (GTIP 10) (Austin, TX) 6—10 Dec. 2010.

Hillary Elmore, L Jean Camp & Brandon Stephens, Diffusion and Adoption of IPv6 in the ARIN Region, WEIS 2008, 22—25 September 2008 (New Haven, CN)

L. Jean Camp, "Net Trust: Signaling Malicious Web Sites", I/S A Journal of Law and Policy in the Information Society, Winter 2007.; workshop verion "Reliable Usable Signaling to Defeat Masquerade Attacks" WEIS 2006 (Cambridge, MA) 26—28 June 2006.

Farzeneh Asgapour, Debin Liu and L. Jean Camp, "Computer Security Mental Models of Computer Security Risks", Usable Security 07, Financial Cryptography and Data Security Lecture Notes in Computer Science Volume 4886, 2007, pp 367—377.

Debin Liu & L Jean Camp, "Proof of Work Can Work" WEIS 2006 (Cambridge, MA) 26—28 June 2006.

L. Jean Camp & Allan Friedman, Peer Production of Security & Privacy Information, Telecommunications Policy Research Conference (Alexandria, VA). Abstract publication. Full publication see Peer Production of Privacy and Security Information.

Allan Friedman & L. Jean Camp, "Making Security Manifest", Second Workshop on the Economics of Information Security, College Park, MA. May 2003.

L. Jean Camp & Catherine Wolfram, "Pricing Security" , Proceedings of the CERT Information Survivability Workshop, Boston, MA Oct. 24—26, 2000, pp. 31—39.

L. Jean Camp & Stephen Lewis, "The Economics of Information Security" Springer—Verlag 2004.

L Jean Camp, "Economics of Information Security" I/S A Journal of Law and Policy in the Information Society, accepted for Winter 2006.

Privacy

G. Norcie & L Jean Camp,A href="http://www.ljean.com/files/abstain.pdf">The Price Of Privacy: An Examination of the Economic Costs of Abstention from Social Networks, 2015 Amsterdam Privacy Conference (APC 2015), 23 — 26 October 2015.

Vaibhav Garg, Kevin Benton, and L. Jean Camp. The Privacy Paradox: A Facebook Case Study 2014 TPRC Conference Paper. 2014.

Vaibhav Garg and L Jean Camp, Cars, Condoms, and Facebook, ISC 2013 (Dallas, Texas) 13—15 November 2013.

L. Jean Camp, Cathleen McGrath & Alla Genkina, Security and Morality: A Tale of User Deceit, Models of Trust for the Web MTW'06, (Edinburgh, Scotland) 22 May 2006

L. Jean Camp, M. Sirbu & J. D. Tygar, "Token and notational money in electronic commerce", USENIX Workshop on Electronic Commerce, July 1995, New York, NY, 1—12. A previous version presented at the Telecommunications Policy Research Conference, October 1994, Solomons Island, MA, pp. 1—12.

L. Jean Camp, "An atomicity—generating layer for anonymous currencies", IEEE Transactions on Software Engineering, March 2001, Vol. 27, No. 3, pp. 272—278.

L. Jean Camp & Carlos Osorio,"Privacy Enhancing Technologies for Internet Commerce", Trust in the Network Economy, Springer—Verlag (Berlin) 2003.

Timothy Kelley & L Jean Camp, Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections , Selected Papers from WEIS 2012, Springer (Berlin, DE) Ch. 8 pp 159—184. (Previous version published in WEIS

Andrew Patrick & L Jean Camp, Risk Mitigation From the Release of Personal Identity Information, Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards. IGI Global. 2011, pp. 309—330.

eHealth: Health Informatics of In—Home Care

Vaibhav Garg, Kevin Benton, and L. Jean Camp. The Privacy Paradox: A Facebook Case Study 2014 TPRC Conference Paper. 2014.

Vaibhav Garg, L. Jean Camp, Lesa Lorenzen—Huber, Kalpana Shankar, Kay Connelly, Privacy Concerns in Assisted Living Technologies
, Annals of Telecommunications (accepted 2013).

Vaibhav Garg, L Jean Camp and Kay Connelly, Risk Communication Design: Video vs. Text, PETS (Vigo, Spain) 11—13 July 2012.

L. Jean Camp & Kay Connelly, Beyond Consent: Systematic Design for Privacy in Ubicomp, Digital Privacy: Theory, Technologies and Practices eds. Alessandro Acquisti, Sabrina De Capitani di Vimercati, Stefanos Gritzalis and Costas Lambrinoudakis, Taylor & Frances. (New York, NY) 2007.

V. Garg, L. Huber, L. J. Camp, K. Connelly, Risk Communication Design for Older Adults, Gerontechnology Vol. 11, No. 2 (2012).

Caine, K. E., Zimmerman, C. Y., Schall—Zimmerman, Z., Hazlewood, W. R., Camp, L. J., Connelly, K. H., Huber, L. L, & Shankar, K, DigiSwitch: A device to allow older adults to monitor and direct the collection and transmission of health information collected at home, Journal of Medical Systems Vol. 35, No. 5, 1181—1195 (2011).

Z. Zimmerman & L Jean Camp, Elder—friendly Design Effects on Acceptance of Novel Technologies, Elderly Interaction Design CHI; CHI 2010 Workshop, (Atlanta GA.) 4 April 2010.

L. Lorenzen—Huber, K. Shankar, K. Caine, K. Connelly, L.J. Camp, B.A. Walker & L. Borrero, How in—home technologies mediate caregiving relationships in later life, International Journal of Human Computer Interaction, 29 (7), 441—455 (2013).

Kalpana Shankar , Lesa Huber. L.Jean Camp, Kelly E. Caine, and Katherine H. Connelly. Finding the Older User in Home—Based Computing Studies, Society on Gerontechnology International Symposium of Automation and Robotics in Construction (ISG*ISARC 2012) (Eindhoven, NL) 26—29 June 2012.

Open Code & Internet Governance

G. Norcie & L Jean Camp, The Price Of Privacy: An Examination of the Economic Costs of Abstention from Social Networks, 2015 Amsterdam Privacy Conference (APC 2015), 23 — 26 October 2015.

Andrew C. Dingman and Gianpaolo Russo, Risk—Based Vulnerability Disclosure: Towards Optimal Policy, TPRC Conference Paper, (Arlington, VA) 2015.

Warigia Bowman, L Jean Camp, Protecting the Internet from Dictators: Technical and Policy Solutions to Ensure Online Freedoms, The Innovation Journal , 18(1), 2013.

V. Garg and L. Jean Camp, Gandhigiri in Cyberspace: A Novel Approach to Information Ethics, ACM SIGCAS Computers & Society, Vol. 42, No. 2: 9—20 (2012).

L. Jean Camp "Varieties of Software and their Implications for Effective Democratic Government", Oxford University Press (Oxford, UK) 2006.

Serena Chan & L. Jean Camp, "Towards Coherent Regulation of Law Enforcement Surveillance in the Network Society ", Ethicomp: The Social and Ethical Impacts of Information and Communications Technologies, Technical University of Gdansk, Gdansk, Poland, 18—20 June 2001, Vol. 2 pp. 86—101. Previous version presented at The 5th International Conference on Technology, Policy, and Innovation, Delft, The Netherlands, 2001.

L. Jean Camp, Fu—Shoun Mao &Mridul Chowdhury,"Thailand at the Crossroads in ICTs" International Journal of Technology Policy and Management. Vol. 4, No. 2, pp. 116—135.

J. Camp "Access Denied" IEEE Security & Privacy, vol. 1, no. 5, Sept./Oct. 2003, pp. 82—85.

L. Jean Camp, "Principles for Design of Digital Rights Management Systems"IEEE Internet Computing, Vol. 6, No. 3 pp. 59—65, May 2003. Previous version available from "DRM Doesn`t Really Mean Copyright" in the peer—reviewed Proceedings of the 2003 ACM Conference on Computer and Communications Security, ACM Press (NY NY).

L. Jean Camp & D. Riley, "Protecting an unwilling electronic populace", Proceedings of the Fifth Conference of Computers Freedom and Privacy, 28—31 March 1995, San Francisco, CA, pp. 120—139.

L. Jean Camp, "Code, Coding and Coded Perspectives", Journal of Information, Communication and Ethics in Society Vol. 1, Jan. 2003, pp. 49—59. (Previously published in the abstract—refereed conference "Code, Coding, and Coded Perspectives", Association of Internet Researchers, Lawrence, Kansas, September 2000.)

L. Jean Camp & Serena Syme,"The Governance of Code: Open Land vs. UCITA Land" ACM SIGCAS Computers and Society, September 2002, Vol. 32, No. 3. Also available at The ACM Computers and Society Page

Serena Syme & L. Jean Camp, "The Governance of Code: Code as Governance", Ethicomp: The Social and Ethical Impacts of Information and Communications Technologies, Technical University of Gdansk, Gdansk, Poland, 18—20 June 2001, Vol. 1, pp. 86—101.

L. Jean Camp & Serena Syme, "A Coherent Intellectual Property Model of Code as Speech, Embedded Product, or Service", Journal of Information Law and Technology, Vol. 2, 2001.

L. Jean Camp & B. Anderson, "Expansion of Telecommunications Infrastructure in Emerging Nations: The Case of Bangladesh", Telecommunications Policy Research Conference, Alexandria, VA. 25—26 Sept. 1999.

L Jean Camp & Ken Lewis, "Code as Speech: a discussion of Bernstein v. USDOJ, Karn v. USDOS, and Junger v Daley in light of the U.S. Supreme Court shift to Federalism",Ethics and Information Technology, March 2001. Vol. 1, No. 2, pp. 1—13. (Earlier version presented at CEPE 2000:Computer Ethics: Philosophical Inquiry, Dartmouth College Hanover, NH (USA) 13—16 July 2000, an abstract—referred conference. Draft version available.)

L. Jean Camp, "The World in 2010: Many New Entrants", info: the journal of policy, regulation and strategy for telecommunications, information and media, Vol. 2 No. 2, April 2000, 167—186.

L. Jean Camp & Brian Anderson, "Deregulating the Local Loop: The Telecommunications Regulation Path Less Chosen as Taken by Bangladesh" , International Journal of Technology Policy and Management Vol. 1, Issue 1. Earlier version presented at INET 2000.

L. Jean Camp & Y.T. Chien, "The Internet as Public Space: Concepts, Issues and Implications in Public Policy", Readings in Cyberethics, eds. R. Spinello and H Tavani, Jones and Bartlett Publishers (Sudbury , MA) January 2001. Previously published in ACM Computers & Society, September 2000. Previous version available

L Jean Camp, "The Post—Convergence Consumer", Creative Destruction, ed. Lee McKnight, MIT Press, Winter (Cambridge, MA) 2000.

L. Jean Camp & Charles Vincent, "Looking to the Internet for Models of Governance" Ethics and Information Technology, 2004, Vol. 6, No. 3, pp. 161—174.

L. Jean Camp, "The Shape of the Network", Governance in a Globalizing World, ed. J. Donahue, Brookings Press (Washington, DC) Summer 2001.

L. Jean Camp, "Community Considered", democracy.com? Governance in a Networked, World Hollis Publishing (Hollis, NH) 1999.

L. Jean Camp, "Democratic Implications of Internet Protocols" The Information Society, Vol. 15, 249 —256, 1999. Previous version presented by invitation at DIMACS Workshop on Design for Values: Ethical, Social and Political Dimensions of Information Technology, February 28 — March 1, 1998; Princeton University, Department of Computer Science, Princeton NJ. Initial version presented as "Privacy on the Web", at the peer—referred conference Symposium on Network & Distributed System Security, 10—11 February 1997, San Diego, CA.

Gender Online

L. Jean Camp, D. Riley, "Bedrooms, barrooms & board rooms on the Internet: the failure of media types in cyberspaces", Selected Papers from the 1996 Telecommunications Policy Net Trust and Trust on the Web, Research Conference, eds. G.L. Rosston & D. Waterman; Lawrence Earlbaum Associates (NY, NY) 1997. A previous version presented at Virtue & Virtuality: A Conference on Gender, Law and Cyberspace, MIT Cambridge, MA, 19—20

L. Jean Camp & D. Riley, "Protecting an unwilling electronic populace", Proceedings of the Fifth Conference of Computers Freedom and Privacy, 28—31 March 1995, San Francisco, CA, pp. 120—139.

L. Jean Camp, "We Are Geeks, and We Are Not Guys: The systers mailing list", Wired Women: Gender and New Realities in Cyberspace, eds., L. Cherny & E. Weise, The Seal Press, (Seattle, WA) January 1996.

L. Jean Camp, "The Shape of the Network", Governance in a Globalizing World, ed. J. Donahue, Brookings Press (Washington, DC) Summer 2001.

L. Jean Camp & Y.T. Chien, "The Internet as Public Space: Concepts, Issues and Implications in Public Policy", Readings in Cyberethics, eds. R. Spinello and H Tavani, Jones and Bartlett Publishers (Sudbury , MA) January 2001. Previously published in ACM Computers & Society, September 2000. Previous version available

Traditional, Experimental Usable Security & Privacy

Jacob Abbott, Violeta Moreno, & L. Jean Camp, Password Differences based on Language and Testing of Memory Recall, Annual Computer Security Applications Conference, (New Oleans, LA), 7-11 December 2014. (poster)

L Jean Camp, Jacob Abbott, and Siyu Chen, cPasswords: Leveraging Episodic Memory and Human-Centered Design for Better Authentication. Hawaii International Conference on System Sciences, (Kauai, HI) 5-9 Jan 2016.

Greg Norcie, Jim Blythe, Kelly Caine, and L. Jean Camp, "Why Johnny Can’t Blow the Whistle: Identifying and Reducing Usability Issues in Anonymity Systems", USEC 14: A NDSS Workshop (San Diego, CA) 23 February 2014.

K. Benton, V Garg and L. Jean Camp, Studying the Effectiveness of Android Application Permissions Requests, Security and Social Networking SESOC 2013, PerCom 2013 Workshop (San Deigo, CA) 18 March 2013.

V. Garg, and L. Jean Camp, Heuristics and Biases: Implications for Security Design, IEEE Technology & Society, Mar. 2013.

Majid Arianezhad, L. Jean Camp, Timothy Kelley, and Douglas Stebila. Comparative eye tracking of experts and novices in web single sign—on. 3rd ACM Conference on Data and Application Security and Privacy (CODASPY) 2013. ACM Press, 2013.

Greg Norcie, Kelly Caine and Jean Camp, Stop—Points in the Installation and Use of Anonymity Systems: A Usability Evaluation of the Tor Browser Bundle, 5th Workshop on Hot Topics in Privacy Enhancing Technologies: HotPETs 2012 (Vigo, Spain) 13 July 2012.

Network Engineering

K Benton, Martin Swany, and Jean Camp, Preventing Data Exfiltration via Political and Geographic Routing Policies, Telecommunications Policy Research Conference (Arlington, VA) 30 Sept. - 2 October 2016

P. Morano, L Jean Camp, Macroeconomic Analysis of Routing Anomalies, TPRC Conference Paper, (Arlington, VA) 2016.

Kevin Benton and L. Jean Camp, Firewalling Scenic Routes: Preventing Data Exfiltration via Political and Geographic Routing Policies SafeConfig 2016: Testing and Evaluation for Active & Resilient Cyber Systems, (Hofburg Palace, Vienna, Austria) October 24, 2016.

Chris Hall, Dongting Yu, Zhi-li Zhang, Jonathan Stout, Andrew Odlyzko, Andrew W. Moore, Jean Camp, Kevin Benton and Ross Anderson, Collaborating with the enemy on network management In Security Protocols XXII (pp. 154-162). Springer International Publishing.

Siyu Chen, Timothy Kelley, Zheng Dong, and L. Jean Camp, "The Effects of HeartBleed on Certificate Change: Meh", ACSAC Poster Session (LA, CA) 10 December 2015.

Kevin Benton, Jean Camp, Timothy Kelley and Martin Swany, "Filtering IP Source Spoofing using FPRPF with SDN", IEEE CNS: Conference on Communications and Network Security (Florence, IT) 28—30 September 2015 (extended version at ICCNS)

Kevin Benton, L Jean Camp & Chris Small, OpenFlow Vulnerability Assessment, HotSDN, August 2013, Hong Kong. Extended abstract.

Timothy Kelley & L Jean Camp, "Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections", Selected Papers from WEIS 2012, Springer (Berlin, DE) Ch. 8 pp 159—184. (Previous version published in WEIS)

Z. Dong, A. Kapadia and L Jean Camp, "Pinning and Binning: Building Whitelists and Blacklists Using Machine Learning", ACSAC Extended Abstracts, (New Orlean, LA) 3—7 December 2013.

Zheng Dong, Rui Wang, Xiaoyong Zhou, L. Jean Camp, Policy Proposal: Limit Address Allocation to extend the Lifetime of IPv4 in the APNIC Region, ACM ACSAC Workshop on Governance of Technology, Information, and Policies (GTIP 10) (Austin, TX) 6—10 Dec. 2010.

Hillary Elmore, L Jean Camp & Brandon Stephens, "Diffusion and Adoption of IPv6 in the ARIN Region", WEIS 2008, 22—25 September 2008 (New Haven, CN)

L. Jean Camp, D.A. Evensky, "Survivability & Trust", Research Directions for the Next Generation Internet, 12—14 May 1997, Washington, DC.

D. Evensky, A. Gentile, L. Jean Camp, & R. Armstrong, "Lilith: Scalable Execution of User Code for Distributed Computing", Proceedings of The 6th IEEE International Symposium on High Performance Distributed Computing, HPDC—6, August 1997, Portland, OR, pp. 123—145.

L. Painton, T. Gaylor, L. Jean Camp, C. Phillips, G. Wyss, "Risk—based characterization of network vulnerability", CERT Information Survivability Workshop, 12 — 13 February 1997, San Diego, CA, pp. 62—64.

L. Jean Camp & Rose Tsang, "Universal service in a ubiquitous digital network", Journal of Ethics and Information Technology, accepted. Previous version presented at INET 1999, an Internet Society abstract—refereed conference.

L. Jean Camp, "An atomicity—generating layer for anonymous currencies", IEEE Transactions on Software Engineering, March 2001, Vol. 27, No. 3, pp. 272—278.

M. Feldman, L. Jean Camp, J. Stack & J. Morris, "Optical interconnects", Chapter 7: Design Issues in Optical Computing, ed. John Lee, Cambridge University Press (Cambridge, MA) 1993.

Ethics & Network Experimentation

L Jean Camp, Respecting People and Respecting Privacy, Communications of the ACM, 58(7), 27—28. 2015.

Sasse, M. A., Palmer, C. C., Jakobsson, M., Consolvo, S., Wash, R., & Camp, L. J. (2014) Helping You Protect You IEEE Security & Privacy, Vol. 12, No. 1, Dec. 39—42. 2014.

Dong, Zheng, Kevin Kane, and L. Jean Camp, "Phishing in Smooth Waters: The State of Banking Certificates in the US", 2014 TPRC Conference Paper. 2014.

Farzeneh Asgapour, Debin Liu and L. Jean Camp, "Computer Security Mental Models of Computer Security Risks"
, Usable Security 07, Financial Cryptography and Data Security Lecture Notes in Computer Science Volume 4886, 2007, pp 367—377.

L Jean Camp, Comments on the Menlo Report, Document ID DHS—2011—0074—0001, The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. Department of Homeland Security (DHS) Washington, DC.

Ty Bross & L. Jean Camp, Benefits and Education in Security & Privacy Research, CREDS: Cyber—security Research Ethics Dialog & Strategy, SF, CA 23 May 2013.

L. Jean Camp amp&; J. Duncan, Conducting an Ethical Study of Web Traffic, 5th Workshop on Cyber Security Experimentation and Test, A USENIX Security Symposium Workshop, (Bellevue, WA) 6 August 2012.

Warigia Bowman, L Jean Camp, Protecting the Internet from Dictators: Technical and Policy Solutions to Ensure Online Freedoms, The Innovation Journal (accepted 2013).

V. Garg and L. Jean Camp, Gandhigiri in Cyberspace: A Novel Approach to Information Ethics, ACM SIGCAS Computers & Society, Vol. 42, No. 2: 9—20 (2012).

L. Jean Camp "Varieties of Software and their Implications for Effective Democratic Government", Oxford University Press (Oxford, UK) 2006.

L. Jean Camp & Y.T. Chien, "The Internet as Public Space: Concepts, Issues and Implications in Public Policy", Readings in Cyberethics, eds. R. Spinello and H Tavani, Jones and Bartlett Publishers (Sudbury , MA) January 2001. Previously published in ACM Computers & Society, September 2000. Previous version available



A couple of Applied Crypto

L. Jean Camp & J. D. Tygar, Providing Auditing and Protecting Privacy, The Information Society, Vol. 10, No. 1: 59—72 (March 1994). (A very early and highly simple version of what is now MPC.)

L. Jean Camp, Michael Harkavy, J.D. Tygar and Bennet Yee, Anonymous Atomic Transactions, 2nd USENIX Workshop on Electronic Commerce Proceedings, November 1996 (Oakland, CA) pp. 123—134.

ICT For Development

L. Jean Camp, Fu—Shoun Mao & Mridul Chowdhury, "Thailand at the Crossroads in ICTs" International Journal of Technology Policy and Management. Vol. 4, No. 2, pp. 116—135.

L. Jean Camp & B. Anderson, "Expansion of Telecommunications Infrastructure in Emerging Nations: The Case of Bangladesh", International Journal of Technology Policy and Management Vol. 1, Issue 1. Earlier version presented at INET 2000.

Warigia Bowman, L Jean Camp, Protecting the Internet from Dictators: Technical and Policy Solutions to Ensure Online Freedoms, The Innovation Journal (accepted 2013).



to top