This page is no longer maintained. Please go to current publications, research, or overview.
Economics of Information Security
Timothy Kelley & L Jean Camp,Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections<\q>, Selected Papers from WEIS 2012, Springer (Berlin, DE) Ch. 8 pp 159-184. (Previous version published in WEIS,
V. Garg & L. Jean Camp, End User Perception of Online Risk Under Uncertainty ", Hawaii International Conference On System Sciences, (Manoa, HI) 4-7 January 2012.
L. Jean Camp, "People Taking Risks Online ", Security and Human Behaviors, (MIT, Cambridge MA) 11 June 2009.
"Mental Models of Security " Security & Human Behavior, (MIT Cambridge MA) 2-3 July 2008.
Farzeneh Asgapour, Debin Liu and L. Jean Camp, "Mental Models of Computer Security Risks ÐExperimental Results ", Usable Security 07, (Tobago) 16 February 2007: Extended Abstract: Mental Models of Computer Security ", Proceedings of Financial Cryptography 2004, Lecture Notes in Computer Science, Springer-Verlag (Berlin) September 2004.
"Computer Attacks have focused on the wrong issues, Boston Globe, A8, Feb. 17, 2000..
Allan Friedman & L. Jean Camp, "Making Security Manifest, " Second Workshop on the Economics of Information Security (College Park, MA) May 2003.
The Economics of Information Security by Kluwer.
An edited collection of reviewed papers by Camp, Varian, Anderson and Schneier.
Selected papers from the Economics of Information Security Workshop Series
- The First
and Second Workshops.
Vote and Vote Counting
The Annotated
Best Practices - A Symposium Summary
A descriptive document providing the viewpoints expressed at the symposium,
expanding upon the original best practices. The critical need for investment
in the human poll workers, auditing, and transparency are discussed in this
report. A final report will include a research agenda, and a description of
the event itself. Sign up to receive the final report at the event site, The
NSF/Harvard Symposium.
Design for Values
L. Jean Camp, Trust & Risk in Internet Commerce, MIT Press (Cambridge, MA), 2000.
Huber, L.,Ê Borrero, L., Walker, B.A., Shankar, K., Caine, K., Connelly, K., Camp, L.J., ÒHow Older Adults Use Information Technology to Reduce Caregiver BurdenÓ, Gerontological Society of America 64th Annual Scientific Meeting, (Boston, MA) 2011, November.
Caine, K. E., Zimmerman, C. Y., Schall-Zimmerman, Z, Hazelwood, W. R., Sulgrove, A. C., Camp, L. J., Connelly, K. H., Lorenzen-Huber, L. M., & Shankar, K, ÒDigiSwitch: Design and Evaluation of a Device for Older Adults to Preserve Privacy While Monitoring Health at HomeÓ, Proceedings of the ACM SIG on International Health Informatics. (Arlington, VA) 2010.
Camp, L.J., Huber, L..L., Borrero, L. What do older adults understand about their privacy risks while online? Conference Proceedings, Gerontological Society of America 63rd Annual Scientific Meeting, (New Orleans, LA) 2010.L. Jean Camp, L. Huber, & Kay Connelly, ÒDesigning Ubicomp with Privacy Constraints Defined by UsersÓ, Nurturing Technologies in the Domestic Environment: Feeling Comforted, Cared for, and Connected at Home, workshop held in conjunction with Ubicomp 2006. (Orange County, CA) 18 Sept. 2006.
L. Jean Camp, & Kay Connelly ÒBeyond Consent: Implications of Ubicomp for Privacy,Ó TPRC 2006, (Washington, DC) 29 Sept.Ð 1 Oct. 2006.
L. Jean Camp, ÒHuman Autonomy in the Age of Active Aware Pervasive ComputingÓ, AAAS Annual Meeting, (St. Louis MO) 16-18 February 2006.
L. Jean Camp, Kay Connelly, & Kalpana Shankar, ÒDesign for Privacy: Towards a Methodological Approach to Trustworthy Ubicomp DesignÓ, Ethicomp 2005 (Linkoping, SE).
L. Jean Camp, ÒCode, Coding and Coded Perspectives,Ó Association of Internet Researchers (Lawrence, KS) 14-17 September 2000.
S. Syme & L. Jean Camp ÒThe Governance of Code: Is Code Governance?Ó Ethicomp: The Social and Ethical Impacts of Information and Communications Technologies, Technical University of Gdansk (Gdansk, Poland) 18-20 June 2001, Vol. 1 pp. 127-145.
Open Code in Government
The Government Open Code Collaborative
was launched June 30, 2004.
Eight states and multiple local governments are combining their code base,
technical competence, and organizational skills to share code for more effective,
efficient, and transparent government.
Identity, Privacy and Identity Management
Identity in Digital Government:
A Research Agenda
Internet Commerce
Trust & Risk in Internet Commerce,
MIT Press, Winter (Cambridge, MA) 2000. The most significant material to be
found here is the full text of Trust and Risk in Internet Commerce. This version
is unedited and has sections deleted. For the full text purchase the bound
volume.
Co-authored by, Michael Harkavy, J.D. Tygar and Bennet Yee, "Anonymous
atomic transactions, " 2nd Annual USENIX Workshop on Electronic Commerce
Proceedings, November 1996, Oakland, CA, pp. 123-134.
Co-authored by, M. Sirbu & J. D. Tygar, "Token
and notational money in electronic commerce ", Usenix Workshop on
Electronic Commerce, July 1995, New York, NY, 1-12. A previous version presented
at the Telecommunications Policy Research Conference, October 1994, Solomons
Island, MA, pp. 1-12.
Telecommunications
Co-authored by Rose Tsang, "Universal
service in a ubiquitous digital network ", Journal of Ethics and Information
Technology, in print. Previous version presented at INET 1999, an Internet
Society abstract-refereed conference .
"Grameen
Phone: Empowering the Poor through Connectivity " iMP: The Magazine
on Information Impacts (December 1999). with Brian Anderson We describe how
GrameenPhone has used a micro-finance system to provide the credit for rural
users to provide access to villages across the nation. We argue that the central
Asian approach, which do not align with the ITU proposes, offer greater potential.
India, Bangladesh, Pakistan and China are the only nations with greater competition
in the local loop than in international long distance, and this can force
funds into the local loop. We argue for greater flexibility in telecommunications
deregulation. A longer version was written with research assistant Brian Anderson,
"De-Regulating
the Local Loop: The Telecommunications Regulation Path Less Chosen as Taken
by Bangladesh " And this work is also available in short form as a
Presentation
"The Internet as Public Space: Concepts, Issues and Implications in Public
Policy ", Readings in Cyberethics, eds. R. Spinello and H Tavani, Jones
and Bartlett Publishers (Sudbury , MA) January 2001. Previously published
in ACM Computers & Society, September 2000. Draft
version available Co-authored by Y.T. Chien.
"Bedrooms, bar-rooms
& board rooms on the Internet: the failure of media types in cyberspaces ",
Selected Papers from the 1996 Telecommunications Policy Research Conference,
eds. G. L. Rosston & D. Waterman; Lawrence Earlbaum Associates (NY, NY)
Summer 1997. A previous version presented at Virtue & Virtuality: A Conference
on Gender, Law and Cyberspace, MIT Cambridge, MA, 19-20 April 1996 Co-authored
by Donna Riley.
Privacy
Some of these are also listed under security, as there is significant commonality
between security and privacy.
Written with research assistant Serena Chan, "Towards
Coherent Regulation of Law Enforcement Surveillance in the Network Society ",
Ethicomp: The Social and Ethical Impacts of Information and Communications
Technologies, Technical University of G'dansk,,Gdansk, Poland, 18-20 June
2001, Vol. 2 pp. 86-101.
"Democratic
Implications of Internet Protocols " The Information Society, Vol.
15, 249 -256, 1999. Previous version presented at DIMACS Workshop on Design
for Values: Ethical, Social and Political Dimensions of Information Technology,
February 28 - March 1, 1998; Princeton University, Department of Computer
Science, Princeton NJ. Initial version presented as Privacy on the Web ",The
Internet Society 1997 Symposium on Network & Distributed System Security,
10-11 February 1997, San Diego, CA.
Co-authored by J. D. Tygar, "Providing
auditing and protecting privacy ", The Information Society, March
1994, Vol. 10, No. 1, 59-72.
Security
Pricing Security, with Catherine
Wolfram, first presented at the CERT Information Survivability Workshop, Boston,
MA Oct. 24-26, 2000, pp. 31-39. This paper argues for a system of trading
credits for system vulnerabilities. We argue first that security is an externality
and secondly that a model for harnessing the market to increase security can
be found in the trading system for pollution externalities. Finally we propose
that vulnerabilities can be quantified and offer an excellent possibility
as the good to be traded.
Serena Chan & L. Jean Camp, "Towards
Coherent Regulation of Law Enforcement Surveillance in the Network Society ",
argues on historical and technical bases that there is a greater need for
protection of digital privacy.
Co-authored by J. D. Tygar, "Providing
auditing and protecting privacy ", The Information Society, March
1994, Vol. 10, No. 1, 59-72.
co-authored by D. Evensky, A. Gentile & R. Armstrong, "Lilith:
Scalable Execution of User Code for Distributed Computing ", Proceedings
of The 6th IEEE International Symposium on High Performance Distributed Computing,
HPDC-6, August 1997, Portland, OR, pp. 123-145. Discusses a project on which
I was lead trust infrastructure designer.
Trust
In Trust: A Collision of
Paradigms we survey the findings in social psychology and philosophy with
respect to trust. We introduce three hypothesis that remain unanswered with
respect to the manner in which humans react to computers. Then we conclude
by noting that research which empowers users in order to be their own security
manager may be based on a fundamentally flawed view of human-computer interaction.
We close by encouraging designers of computer security systems to examine
the humans, which these systems are intended to empower, and recommend that
any security system be built on the basis of understanding of human trust
provided by the social sciences.
Survivability &
Trust with D. Evensky, first presented at, Research Directions for the
Next Generation Internet, 12-14 May 1997, Washington, DC. We describe how
privacy can been seen as another paradigm for trust -- one which offers a
distributed scalable approach to security which is more scalable than centralized
key mechanisms (including PKI using CAs).
Trust & Risk in Internet Commerce,
MIT Press, Winter (Cambridge, MA) 2000.
L. Jean Camp Peer to Peer Systems,
The Internet Encyclopedia ed. Hossein Bidgoli, John Wiley & Sons (Hoboken,
New Jersey) 2003.
Trust is the core problem with peer to peer technologies. After understanding
their fundamental purposes, it is clear that P2P systems fulfill critical
knowledge management needs for professional environments.
L. Jean Camp, "Design
for Trust ", Trust, Reputation and Security: Theories and Practice,
ed. Rino Falcone, Springer-Verlang (Berlin) 2003.
Here trust is defined from various disciplinary perspectives, and I argue
that all are necessary.
Internet Governance
"Internet Governance, From Meritocracy to Adhocracy to Bureaucracy "
Presentation.
A consideration of the growth of Internet governance; hopefully with few opinions
built in given the normally contentious nature of the so-called DNS wars.
This includes a quick review of domain names, IP addresses, and the distribution
of names. Originally presented at: , CPSR Internet Governance Workshop, Washington,
D.C., September, 1999.
Written with research assistant Serena Syme, "Code
as Embedded Speech, Machine, Service ", Ethicomp: The Social and Ethical
Impacts of Information and Communications Technologies, Technical University
of G'dansk, Gdansk, Poland, 18-20 June 2001, Vol. 1, pp. 86-101.
Also with Serena Syme, "The
Governance of Code:Code as Governance ", Ethicomp: The Social and
Ethical Impacts of Information and Communications Technologies, Technical
University of Gdansk, Gdansk, Poland, 18-20 June 2001, Vol. 1, pp. 86-101.
Co-authored by D. Riley, "Protecting
an unwilling electronic populace ", Proceedings of the Fifth Conference
of Computers Freedom and Privacy, 28-31 March 1995, San Francisco, CA, pp.
120-139.
"Code as Speech: a discussion of Bernstein v. USDOJ, Karn v. USDOS, and
Junger v Daley in light of the U.S. Supreme Court's shift to Federalism ",Ethics
and Information Technology, March 2001. Vol. 1, No. 2, pp. 1-13. (earlier
version presented at CEPE 2000:Computer Ethics: Philosophical Inquiry, Dartmouth
College Hanover, NH (USA) 13-16 July 2000. Draft
version available. Co-authored by research assistant Ken Lewis.
To locate other interesting venues for interdisciplinary work see the listing
of interdisciplinary events at the Comprehensive
listing of interdisciplinary events and calls.