Research Topics:Open Code       CV      



This page is no longer maintained. Please go to current publications, research, or overview.


Economics of Information Security
Timothy Kelley & L Jean Camp,Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections<\q>, Selected Papers from WEIS 2012, Springer (Berlin, DE) Ch. 8 pp 159-184. (Previous version published in WEIS, V. Garg & L. Jean Camp, End User Perception of Online Risk Under Uncertainty &quot;, Hawaii International Conference On System Sciences, (Manoa, HI) 4-7 January 2012. L. Jean Camp, &quot;People Taking Risks Online &quot;, Security and Human Behaviors, (MIT, Cambridge MA) 11 June 2009. &quot;Mental Models of Security &quot; Security & Human Behavior, (MIT Cambridge MA) 2-3 July 2008. Farzeneh Asgapour, Debin Liu and L. Jean Camp, &quot;Mental Models of Computer Security Risks –Experimental Results &quot;, Usable Security 07, (Tobago) 16 February 2007: Extended Abstract: Mental Models of Computer Security &quot;, Proceedings of Financial Cryptography 2004, Lecture Notes in Computer Science, Springer-Verlag (Berlin) September 2004. &quot;Computer Attacks have focused on the wrong issues, Boston Globe, A8, Feb. 17, 2000.. Allan Friedman & L. Jean Camp, &quot;Making Security Manifest, &quot; Second Workshop on the Economics of Information Security (College Park, MA) May 2003. The Economics of Information Security by Kluwer.

An edited collection of reviewed papers by Camp, Varian, Anderson and Schneier. Selected papers from the Economics of Information Security Workshop Series - The First and Second Workshops.

Vote and Vote Counting

The Annotated Best Practices - A Symposium Summary

A descriptive document providing the viewpoints expressed at the symposium, expanding upon the original best practices. The critical need for investment in the human poll workers, auditing, and transparency are discussed in this report. A final report will include a research agenda, and a description of the event itself. Sign up to receive the final report at the event site, The NSF/Harvard Symposium.


Design for Values

L. Jean Camp, Trust & Risk in Internet Commerce, MIT Press (Cambridge, MA), 2000. Huber, L.,  Borrero, L., Walker, B.A., Shankar, K., Caine, K., Connelly, K., Camp, L.J., “How Older Adults Use Information Technology to Reduce Caregiver Burden”, Gerontological Society of America 64th Annual Scientific Meeting, (Boston, MA) 2011, November. Caine, K. E., Zimmerman, C. Y., Schall-Zimmerman, Z, Hazelwood, W. R., Sulgrove, A. C., Camp, L. J., Connelly, K. H., Lorenzen-Huber, L. M., & Shankar, K, “DigiSwitch: Design and Evaluation of a Device for Older Adults to Preserve Privacy While Monitoring Health at Home”, Proceedings of the ACM SIG on International Health Informatics. (Arlington, VA) 2010. Camp, L.J., Huber, L..L., Borrero, L. What do older adults understand about their privacy risks while online? Conference Proceedings, Gerontological Society of America 63rd Annual Scientific Meeting, (New Orleans, LA) 2010.L. Jean Camp, L. Huber, & Kay Connelly, “Designing Ubicomp with Privacy Constraints Defined by Users”, Nurturing Technologies in the Domestic Environment: Feeling Comforted, Cared for, and Connected at Home, workshop held in conjunction with Ubicomp 2006. (Orange County, CA) 18 Sept. 2006. L. Jean Camp, & Kay Connelly “Beyond Consent: Implications of Ubicomp for Privacy,” TPRC 2006, (Washington, DC) 29 Sept.– 1 Oct. 2006. L. Jean Camp, “Human Autonomy in the Age of Active Aware Pervasive Computing”, AAAS Annual Meeting, (St. Louis MO) 16-18 February 2006. L. Jean Camp, Kay Connelly, & Kalpana Shankar, “Design for Privacy: Towards a Methodological Approach to Trustworthy Ubicomp Design”, Ethicomp 2005 (Linkoping, SE). L. Jean Camp, “Code, Coding and Coded Perspectives,” Association of Internet Researchers (Lawrence, KS) 14-17 September 2000. S. Syme & L. Jean Camp “The Governance of Code: Is Code Governance?” Ethicomp: The Social and Ethical Impacts of Information and Communications Technologies, Technical University of Gdansk (Gdansk, Poland) 18-20 June 2001, Vol. 1 pp. 127-145.
Open Code in Government

The Government Open Code Collaborative was launched June 30, 2004.

Eight states and multiple local governments are combining their code base, technical competence, and organizational skills to share code for more effective, efficient, and transparent government.

Identity, Privacy and Identity Management

Identity in Digital Government: A Research Agenda

Internet Commerce

Trust & Risk in Internet Commerce, MIT Press, Winter (Cambridge, MA) 2000. The most significant material to be found here is the full text of Trust and Risk in Internet Commerce. This version is unedited and has sections deleted. For the full text purchase the bound volume.

Co-authored by, Michael Harkavy, J.D. Tygar and Bennet Yee, &quot;Anonymous atomic transactions, &quot; 2nd Annual USENIX Workshop on Electronic Commerce Proceedings, November 1996, Oakland, CA, pp. 123-134.

Co-authored by, M. Sirbu & J. D. Tygar, &quot;Token and notational money in electronic commerce &quot;, Usenix Workshop on Electronic Commerce, July 1995, New York, NY, 1-12. A previous version presented at the Telecommunications Policy Research Conference, October 1994, Solomons Island, MA, pp. 1-12.

Telecommunications


Co-authored by Rose Tsang, &quot;Universal service in a ubiquitous digital network &quot;, Journal of Ethics and Information Technology, in print. Previous version presented at INET 1999, an Internet Society abstract-refereed conference .

&quot;Grameen Phone: Empowering the Poor through Connectivity &quot; iMP: The Magazine on Information Impacts (December 1999). with Brian Anderson We describe how GrameenPhone has used a micro-finance system to provide the credit for rural users to provide access to villages across the nation. We argue that the central Asian approach, which do not align with the ITU proposes, offer greater potential. India, Bangladesh, Pakistan and China are the only nations with greater competition in the local loop than in international long distance, and this can force funds into the local loop. We argue for greater flexibility in telecommunications deregulation. A longer version was written with research assistant Brian Anderson, &quot;De-Regulating the Local Loop: The Telecommunications Regulation Path Less Chosen as Taken by Bangladesh &quot; And this work is also available in short form as a Presentation

&quot;The Internet as Public Space: Concepts, Issues and Implications in Public Policy &quot;, Readings in Cyberethics, eds. R. Spinello and H Tavani, Jones and Bartlett Publishers (Sudbury , MA) January 2001. Previously published in ACM Computers & Society, September 2000. Draft version available Co-authored by Y.T. Chien.

&quot;Bedrooms, bar-rooms & board rooms on the Internet: the failure of media types in cyberspaces &quot;, Selected Papers from the 1996 Telecommunications Policy Research Conference, eds. G. L. Rosston & D. Waterman; Lawrence Earlbaum Associates (NY, NY) Summer 1997. A previous version presented at Virtue & Virtuality: A Conference on Gender, Law and Cyberspace, MIT Cambridge, MA, 19-20 April 1996 Co-authored by Donna Riley.

Privacy

Some of these are also listed under security, as there is significant commonality between security and privacy.

Written with research assistant Serena Chan, &quot;Towards Coherent Regulation of Law Enforcement Surveillance in the Network Society &quot;, Ethicomp: The Social and Ethical Impacts of Information and Communications Technologies, Technical University of G'dansk,,Gdansk, Poland, 18-20 June 2001, Vol. 2 pp. 86-101.

&quot;Democratic Implications of Internet Protocols &quot; The Information Society, Vol. 15, 249 -256, 1999. Previous version presented at DIMACS Workshop on Design for Values: Ethical, Social and Political Dimensions of Information Technology, February 28 - March 1, 1998; Princeton University, Department of Computer Science, Princeton NJ. Initial version presented as Privacy on the Web &quot;,The Internet Society 1997 Symposium on Network & Distributed System Security, 10-11 February 1997, San Diego, CA.

Co-authored by J. D. Tygar, &quot;Providing auditing and protecting privacy &quot;, The Information Society, March 1994, Vol. 10, No. 1, 59-72.

Security

Pricing Security, with Catherine Wolfram, first presented at the CERT Information Survivability Workshop, Boston, MA Oct. 24-26, 2000, pp. 31-39. This paper argues for a system of trading credits for system vulnerabilities. We argue first that security is an externality and secondly that a model for harnessing the market to increase security can be found in the trading system for pollution externalities. Finally we propose that vulnerabilities can be quantified and offer an excellent possibility as the good to be traded.

Serena Chan & L. Jean Camp, &quot;Towards Coherent Regulation of Law Enforcement Surveillance in the Network Society &quot;, argues on historical and technical bases that there is a greater need for protection of digital privacy.

Co-authored by J. D. Tygar, &quot;Providing auditing and protecting privacy &quot;, The Information Society, March 1994, Vol. 10, No. 1, 59-72.

co-authored by D. Evensky, A. Gentile & R. Armstrong, &quot;Lilith: Scalable Execution of User Code for Distributed Computing &quot;, Proceedings of The 6th IEEE International Symposium on High Performance Distributed Computing, HPDC-6, August 1997, Portland, OR, pp. 123-145. Discusses a project on which I was lead trust infrastructure designer.

Trust

In Trust: A Collision of Paradigms we survey the findings in social psychology and philosophy with respect to trust. We introduce three hypothesis that remain unanswered with respect to the manner in which humans react to computers. Then we conclude by noting that research which empowers users in order to be their own security manager may be based on a fundamentally flawed view of human-computer interaction. We close by encouraging designers of computer security systems to examine the humans, which these systems are intended to empower, and recommend that any security system be built on the basis of understanding of human trust provided by the social sciences.

Survivability & Trust with D. Evensky, first presented at, Research Directions for the Next Generation Internet, 12-14 May 1997, Washington, DC. We describe how privacy can been seen as another paradigm for trust -- one which offers a distributed scalable approach to security which is more scalable than centralized key mechanisms (including PKI using CAs).

Trust & Risk in Internet Commerce, MIT Press, Winter (Cambridge, MA) 2000.

L. Jean Camp Peer to Peer Systems, The Internet Encyclopedia ed. Hossein Bidgoli, John Wiley & Sons (Hoboken, New Jersey) 2003.

Trust is the core problem with peer to peer technologies. After understanding their fundamental purposes, it is clear that P2P systems fulfill critical knowledge management needs for professional environments.

L. Jean Camp, &quot;Design for Trust &quot;, Trust, Reputation and Security: Theories and Practice, ed. Rino Falcone, Springer-Verlang (Berlin) 2003.

Here trust is defined from various disciplinary perspectives, and I argue that all are necessary.

Internet Governance

&quot;Internet Governance, From Meritocracy to Adhocracy to Bureaucracy &quot; Presentation.
A consideration of the growth of Internet governance; hopefully with few opinions built in given the normally contentious nature of the so-called DNS wars. This includes a quick review of domain names, IP addresses, and the distribution of names. Originally presented at: , CPSR Internet Governance Workshop, Washington, D.C., September, 1999.

Written with research assistant Serena Syme, &quot;Code as Embedded Speech, Machine, Service &quot;, Ethicomp: The Social and Ethical Impacts of Information and Communications Technologies, Technical University of G'dansk, Gdansk, Poland, 18-20 June 2001, Vol. 1, pp. 86-101.

Also with Serena Syme, &quot;The Governance of Code:Code as Governance &quot;, Ethicomp: The Social and Ethical Impacts of Information and Communications Technologies, Technical University of Gdansk, Gdansk, Poland, 18-20 June 2001, Vol. 1, pp. 86-101.

Co-authored by D. Riley, &quot;Protecting an unwilling electronic populace &quot;, Proceedings of the Fifth Conference of Computers Freedom and Privacy, 28-31 March 1995, San Francisco, CA, pp. 120-139.

&quot;Code as Speech: a discussion of Bernstein v. USDOJ, Karn v. USDOS, and Junger v Daley in light of the U.S. Supreme Court's shift to Federalism &quot;,Ethics and Information Technology, March 2001. Vol. 1, No. 2, pp. 1-13. (earlier version presented at CEPE 2000:Computer Ethics: Philosophical Inquiry, Dartmouth College Hanover, NH (USA) 13-16 July 2000. Draft version available. Co-authored by research assistant Ken Lewis.

To locate other interesting venues for interdisciplinary work see the listing of interdisciplinary events at the Comprehensive listing of interdisciplinary events and calls.