L. Jean Camp
Orcid: 0000-0001-8731-7884Affiliations:
- Indiana University, Bloomington, IN, USA
According to our database1,
L. Jean Camp
authored at least 148 papers
between 1992 and 2024.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2021, "For contributions to computer security and e-crime measures".
IEEE Fellow
IEEE Fellow 2018, "For research in human-centered risk and security".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Proceedings of the Companion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing, 2024
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
<i>Avara: </i> A Uniform Evaluation System for Perceptibility Analysis Against Adversarial Object Evasion Attacks.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Discourse, Challenges, and Prospects Around the Adoption and Dissemination of Software Bills of Materials (SBOMs).
Proceedings of the IEEE International Symposium on Technology and Society, 2023
An Argument for Linguistic Expertise in Cyberthreat Analysis: LOLSec in Russian Language eCrime Landscape.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023
2022
IACR Cryptol. ePrint Arch., 2022
Integrating Human Intelligence to Bypass Information Asymmetry in Procurement Decision-Making.
Proceedings of the IEEE Military Communications Conference, 2022
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022
Proceedings of the EuroUSEC 2022: European Symposium on Usable Security, Karlsruhe, Germany, September 29, 2022
Building and Testing a Network of Social Trust in an Underground Forum: Robust Connections and Overlapping Criminal Domains.
Proceedings of the APWG Symposium on Electronic Crime Research, 2022
2021
Bayesian evaluation of privacy-preserving risk communication for user android app preferences.
Inf. Comput. Secur., 2021
A holistic analysis of web-based public key infrastructure failures: comparing experts' perceptions and real-world incidents.
J. Cybersecur., 2021
On the Analysis of MUD-Files' Interactions, Conflicts, and Configuration Requirements Before Deployment.
CoRR, 2021
Comput. Networks, 2021
Protecting IoT Devices through Localized Detection of BGP Hijacks for Individual Things.
Proceedings of the IEEE Security and Privacy Workshops, 2021
Non-Inclusive Online Security: Older Adults' Experience with Two-Factor Authentication.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
Proceedings of the Human Aspects of Information Security and Assurance, 2021
Short Paper: Organizational Security: Implementing a Risk-Reduction-Based Incentivization Model for MFA Adoption.
Proceedings of the Financial Cryptography and Data Security, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Is Visualization Enough? Evaluating the Efficacy of MUD-Visualizer in Enabling Ease of Deployment for Manufacturer Usage Description (MUD).
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
Privacy in Crisis: Participants' Privacy Preferences for Health and Marketing Data during a Pandemic.
Proceedings of the WPES'20: Proceedings of the 19th Workshop on Privacy in the Electronic Society, 2020
Lessons Learnt from Comparing WhatsApp Privacy Concerns Across Saudi and Indian Populations.
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020
Proceedings of the 13th International Conference on Systematic Approaches to Digital Forensic Engineering, 2020
MFA is A Necessary Chore!: Exploring User Mental Models of Multi-Factor Authentication Technologies.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
Quantifying Susceptibility to Spear Phishing in a High School Environment Using Signal Detection Theory.
Proceedings of the Human Aspects of Information Security and Assurance, 2020
Bayesian Evaluation of User App Choices in the Presence of Risk Communication on Android Devices.
Proceedings of the Human Aspects of Information Security and Assurance, 2020
Proceedings of the Financial Cryptography and Data Security, 2020
Proceedings of the 2nd Conference on Conversational User Interfaces, 2020
Proceedings of the 6th IEEE International Conference on Collaboration and Internet Computing, 2020
2019
Proceedings of the 2nd USENIX Workshop on Hot Topics in Edge Computing, 2019
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance, 2019
MFA is a Waste of Time! Understanding Negative Connotation Towards MFA Applications via User Generated Content.
Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance, 2019
Security Mandates are Pervasive: An Inter-School Study on Analyzing User Authentication Behavior.
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019
2018
Stopping the Insider at the Gates: Protecting Organizational Assets through Graph Mining.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018
Security and privacy in online social networking: Risk perceptions and precautionary behaviour.
Comput. Hum. Behav., 2018
Poster Abstract: Who's Watching Your Child? Exploring Home Security Risks with Smart Toy Bears.
Proceedings of the 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation, 2018
Proceedings of the 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation, 2018
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018
Why Johnny Doesn't Use Two Factor A Two-Phase Usability Study of the FIDO U2F Security Key.
Proceedings of the Financial Cryptography and Data Security, 2018
2017
Comput. Secur., 2017
Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust, 2017
Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30, 2017
2016
Detection of Rogue Certificates from Trusted Certificate Authorities Using Deep Neural Networks.
ACM Trans. Priv. Secur., 2016
Proceedings of the Workshop on Privacy Indicators, 2016
Firewalling Scenic Routes: Preventing Data Exfiltration via Political and Geographic Routing Policies.
Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense, 2016
Proceedings of the 2016 IEEE Military Communications Conference, 2016
CPasswords: Leveraging Episodic Memory and Human-Centered Design for Better Authentication.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016
2015
Proceedings of the 2015 APWG Symposium on Electronic Crime Research, 2015
Beyond the lock icon: real-time detection of phishing websites using public key certificates.
Proceedings of the 2015 APWG Symposium on Electronic Crime Research, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
2014
Proceedings of the Security Protocols XXII, 2014
2013
IEEE Technol. Soc. Mag., 2013
Int. J. Hum. Comput. Interact., 2013
Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, 2013
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the Information Security, 16th International Conference, 2013
Proceedings of the Social Implications of Wearable Computing and Augmediated Reality in Everyday Life: 2013 IEEE International Symposium on Technology and Society, 2013
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections.
Proceedings of the Economics of Information Security and Privacy, 2013
Proceedings of the Economics of Information Security and Privacy, 2013
2012
SIGCAS Comput. Soc., 2012
IEEE Pervasive Comput., 2012
Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections.
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012
Proceedings of the 5th Workshop on Cyber Security Experimentation and Test, 2012
Proceedings of the 7th USENIX Workshop on Hot Topics in Security, 2012
Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012
Proceedings of the New Security Paradigms Workshop, 2012
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012
Springer, ISBN: 978-1-4614-1917-4, 2012
2011
DigiSwitch: A Device to Allow Older Adults to Monitor and Direct the Collection and Transmission of Health Information Collected at Home.
J. Medical Syst., 2011
Proceedings of the 16th International Conference on Intelligent User Interfaces, 2011
Proceedings of the Financial Cryptography and Data Security, 2011
Proceedings of the 2011 eCrime Researchers Summit, 2011
2010
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010
Proceedings of the 3rd International Conference on Pervasive Technologies Related to Assistive Environments, 2010
DigiSwitch: design and evaluation of a device for older adults to preserve privacy while monitoring health at home.
Proceedings of the ACM International Health Informatics Symposium, 2010
2009
Proceedings of the Persuasive Technology, Fourth International Conference, 2009
A Risk Based Approach to Limit the Effects of Covert Channels for Internet Sensor Data Aggregators for Sensor Privacy.
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009
Proceedings of the Financial Cryptography and Data Security, 2009
Proceedings of the Autonomic and Trusted Computing, 6th International Conference, 2009
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009
2008
Int. J. Crit. Infrastructure Prot., 2008
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008
2007
Proceedings of the 6th Annual Workshop on the Economics of Information Security, 2007
Proceedings of the Financial Cryptography and Data Security, 2007
Proceedings of the Financial Cryptography and Data Security, 2007
Springer, ISBN: 978-0-387-34589-5, 2007
2006
Proceedings of the 5th Annual Workshop on the Economics of Information Security, 2006
Proceedings of the 5th Annual Workshop on the Economics of Information Security, 2006
Proceedings of the WWW'06 Workshop on Models of Trust for the Web (MTW'06), 2006
2005
Proceedings of the 2005 National Conference on Digital Government Research, 2005
2004
Proceedings of the Economics of Information Security, 2004
Proceedings of the Practical Handbook of Internet Computing., 2004
Proceedings of the 2004 Annual National Conference on Digital Government Research, 2004
Proceedings of the 2004 Annual National Conference on Digital Government Research, 2004
2003
Proceedings of the 2003 International Symposium on Technology and Society, 2003
Proceedings of the 2003 Annual National Conference on Digital Government Research, 2003
2002
Proceedings of the Financial Cryptography, 6th International Conference, 2002
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002
2001
IEEE Trans. Software Eng., 2001
2000
SIGCAS Comput. Soc., 2000
Proceedings of the Tenth Conference on Computers, 2000
1999
1997
Proceedings of the 6th International Symposium on High Performance Distributed Computing, 1997
1995
Proceedings of the First USENIX Workshop on Electronic Commerce, 1995
1994
1992
Proceedings of the 1993 Conference on Computer Personnel Research, 1992