L. Jean Camp

Orcid: 0000-0001-8731-7884

Affiliations:
  • Indiana University, Bloomington, IN, USA


According to our database1, L. Jean Camp authored at least 148 papers between 1992 and 2024.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2021, "For contributions to computer security and e-crime measures".

IEEE Fellow

IEEE Fellow 2018, "For research in human-centered risk and security".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
User-Centered Phishing Detection through Personalized Edge Computing.
Proceedings of the Companion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing, 2024

Comparing the Use and Usefulness of Four IoT Security Labels.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024

<i>Avara: </i> A Uniform Evaluation System for Perceptibility Analysis Against Adversarial Object Evasion Attacks.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Discourse, Challenges, and Prospects Around the Adoption and Dissemination of Software Bills of Materials (SBOMs).
Proceedings of the IEEE International Symposium on Technology and Society, 2023

An Argument for Linguistic Expertise in Cyberthreat Analysis: LOLSec in Russian Language eCrime Landscape.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023

2022
Evaluating user susceptibility to phishing attacks.
Inf. Comput. Secur., 2022

A Proposal for Assisted Private Information Retrieval.
IACR Cryptol. ePrint Arch., 2022

Editorial: Human-Centric Security and Privacy.
Frontiers Big Data, 2022

Areas of Strategic Visibility: Disability Bias in Biometrics.
CoRR, 2022

Integrating Human Intelligence to Bypass Information Asymmetry in Procurement Decision-Making.
Proceedings of the IEEE Military Communications Conference, 2022

Criteria and Analysis for Human-Centered Browser Fingerprinting Countermeasures.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

Privacy Lessons Learnt from Deploying an IoT Ecosystem in the Home.
Proceedings of the EuroUSEC 2022: European Symposium on Usable Security, Karlsruhe, Germany, September 29, 2022

Building and Testing a Network of Social Trust in an Underground Forum: Robust Connections and Overlapping Criminal Domains.
Proceedings of the APWG Symposium on Electronic Crime Research, 2022

2021
Bayesian evaluation of privacy-preserving risk communication for user android app preferences.
Inf. Comput. Secur., 2021

A holistic analysis of web-based public key infrastructure failures: comparing experts' perceptions and real-world incidents.
J. Cybersecur., 2021

On the Analysis of MUD-Files' Interactions, Conflicts, and Configuration Requirements Before Deployment.
CoRR, 2021

Panel: Humans and Technology for Inclusive Privacy and Security.
CoRR, 2021

Using bursty announcements for detecting BGP routing anomalies.
Comput. Networks, 2021

Protecting IoT Devices through Localized Detection of BGP Hijacks for Individual Things.
Proceedings of the IEEE Security and Privacy Workshops, 2021

Non-Inclusive Online Security: Older Adults' Experience with Two-Factor Authentication.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Making Access Control Easy in IoT.
Proceedings of the Human Aspects of Information Security and Assurance, 2021

Short Paper: Organizational Security: Implementing a Risk-Reduction-Based Incentivization Model for MFA Adoption.
Proceedings of the Financial Cryptography and Data Security, 2021

Human and Organizational Factors in Public Key Certificate Authority Failures.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Is Visualization Enough? Evaluating the Efficacy of MUD-Visualizer in Enabling Ease of Deployment for Manufacturer Usage Description (MUD).
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Best Practices Would Make Things Better in the IoT.
IEEE Secur. Priv., 2020

Toward a Secure Internet of Things: Directions for Research.
IEEE Secur. Priv., 2020

Privacy in Crisis: Participants' Privacy Preferences for Health and Marketing Data during a Pandemic.
Proceedings of the WPES'20: Proceedings of the 19th Workshop on Privacy in the Electronic Society, 2020

Lessons Learnt from Comparing WhatsApp Privacy Concerns Across Saudi and Indian Populations.
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020

Fingerprinting Edge and Cloud Services in IoT.
Proceedings of the 13th International Conference on Systematic Approaches to Digital Forensic Engineering, 2020

MFA is A Necessary Chore!: Exploring User Mental Models of Multi-Factor Authentication Technologies.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

Quantifying Susceptibility to Spear Phishing in a High School Environment Using Signal Detection Theory.
Proceedings of the Human Aspects of Information Security and Assurance, 2020

Bayesian Evaluation of User App Choices in the Presence of Risk Communication on Android Devices.
Proceedings of the Human Aspects of Information Security and Assurance, 2020

User-Centered Risk Communication for Safer Browsing.
Proceedings of the Financial Cryptography and Data Security, 2020

User Engagement with Chatbots: A Discursive Psychology Approach.
Proceedings of the 2nd Conference on Conversational User Interfaces, 2020

Smart Storytelling: Video and Text Risk Communication to Increase MFA Acceptability.
Proceedings of the 6th IEEE International Conference on Collaboration and Internet Computing, 2020

2019
Using ML to Block BGP Hijacking.
login Usenix Mag., 2019

Using Bursty Announcements for Early Detection of BGP Routing Anomalies.
CoRR, 2019

Throwing MUD into the FOG: Defending IoT and Fog by expanding MUD to Fog network.
Proceedings of the 2nd USENIX Workshop on Hot Topics in Edge Computing, 2019

Measuring Human Resilience in the Face of the Global Epidemiology of Cyber Attacks.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Evaluating User Perception of Multi-Factor Authentication: A Systematic Review.
Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance, 2019

MFA is a Waste of Time! Understanding Negative Connotation Towards MFA Applications via User Generated Content.
Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance, 2019

Security Mandates are Pervasive: An Inter-School Study on Analyzing User Authentication Behavior.
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019

2018
Stopping the Insider at the Gates: Protecting Organizational Assets through Graph Mining.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018

Security and privacy in online social networking: Risk perceptions and precautionary behaviour.
Comput. Hum. Behav., 2018

Poster Abstract: Who's Watching Your Child? Exploring Home Security Risks with Smart Toy Bears.
Proceedings of the 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation, 2018

Poster Abstract: Good Advice That Just Doesn't Help.
Proceedings of the 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation, 2018

Understanding privacy concerns of whatsapp users in India: poster.
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018

Privacy Practices, Preferences, and Compunctions: WhatsApp Users in India.
Proceedings of the Twelfth International Symposium on Human Aspects of Information Security & Assurance, 2018

Why Johnny Doesn't Use Two Factor A Two-Phase Usability Study of the FIDO U2F Security Key.
Proceedings of the Financial Cryptography and Data Security, 2018

2017
Factors in an end user security expertise instrument.
Inf. Comput. Secur., 2017

Incompetents, criminals, or spies: Macroeconomic analysis of routing anomalies.
Comput. Secur., 2017

A qualitative study on usability and acceptability of Yubico security key.
Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust, 2017

Insider Threat Event Detection in User-System Interactions.
Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30, 2017

2016
Detection of Rogue Certificates from Trusted Certificate Authorities Using Deep Neural Networks.
ACM Trans. Priv. Secur., 2016

Influence of Privacy Attitude and Privacy Cue Framing on Android App Choices.
Proceedings of the Workshop on Privacy Indicators, 2016

Firewalling Scenic Routes: Preventing Data Exfiltration via Political and Geographic Routing Policies.
Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense, 2016

Bongo: A BGP speaker built for defending against bad routes.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

CPasswords: Leveraging Episodic Memory and Human-Centered Design for Better Authentication.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

What Can Johnny Do?–Factors in an End-User Expertise Instrument.
Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance, 2016

2015
Why cybercrime?
SIGCAS Comput. Soc., 2015

Respecting people and respecting privacy.
Commun. ACM, 2015

Spare the rod, spoil the network security? Economic analysis of sanctions online.
Proceedings of the 2015 APWG Symposium on Electronic Crime Research, 2015

Beyond the lock icon: real-time detection of phishing websites using public key certificates.
Proceedings of the 2015 APWG Symposium on Electronic Crime Research, 2015

Filtering IP source spoofing using feasible path reverse path forwarding with SDN.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Helping You Protect You.
IEEE Secur. Priv., 2014

Privacy concerns in assisted living technologies.
Ann. des Télécommunications, 2014

Collaborating with the Enemy on Network Management.
Proceedings of the Security Protocols XXII, 2014

2013
Heuristics and Biases: Implications for Security Design.
IEEE Technol. Soc. Mag., 2013

How In-Home Technologies Mediate Caregiving Relationships in Later Life.
Int. J. Hum. Comput. Interact., 2013

Cross-country analysis of spambots.
EURASIP J. Inf. Secur., 2013

OpenFlow vulnerability assessment.
Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, 2013

Studying the effectiveness of android application permissions requests.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013

Macroeconomic Analysis of Malware.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Cars, Condoms, and Facebook.
Proceedings of the Information Security, 16th International Conference, 2013

Peer-produced privacy protection.
Proceedings of the Social Implications of Wearable Computing and Augmediated Reality in Everyday Life: 2013 IEEE International Symposium on Technology and Society, 2013

Comparative eye tracking of experts and novices in web single sign-on.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections.
Proceedings of the Economics of Information Security and Privacy, 2013

Analysis of Ecrime in Crowd-Sourced Labor Markets: Mechanical Turk vs. Freelancer.
Proceedings of the Economics of Information Security and Privacy, 2013

2012
Gandhigiri in cyberspace: a novel approach to information ethics.
SIGCAS Comput. Soc., 2012

Aging, Privacy, and Home-Based Computing: Developing a Design Framework.
IEEE Pervasive Comput., 2012

Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections.
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012

Analysis of eCrime in Crowd-sourced Labor Markets: Mechanical Turk vs. Freelancer.
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012

Conducting an Ethical Study of Web Traffic.
Proceedings of the 5th Workshop on Cyber Security Experimentation and Test, 2012

PeerSec: Towards Peer Production and Crowdsourcing for Enhanced Security.
Proceedings of the 7th USENIX Workshop on Hot Topics in Security, 2012

Implementing Mental Models.
Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012

Risk Communication Design: Video vs. Text.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

Pools, clubs and security: designing for a party not a person.
Proceedings of the New Security Paradigms Workshop, 2012

End User Perception of Online Risk under Uncertainty.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

The Economics of Financial and Medical Identity Theft.
Springer, ISBN: 978-1-4614-1917-4, 2012

2011
The decreasing marginal value of evaluation network size.
SIGCAS Comput. Soc., 2011

DigiSwitch: A Device to Allow Older Adults to Monitor and Direct the Collection and Transmission of Health Information Collected at Home.
J. Medical Syst., 2011

Security Risk Management Using Incentives.
IEEE Secur. Priv., 2011

Targeted risk communication for computer security.
Proceedings of the 16th International Conference on Intelligent User Interfaces, 2011

Beyond Risk-Based Access Control: Towards Incentive-Based Access Control.
Proceedings of the Financial Cryptography and Data Security, 2011

The smuggling theory approach to organized digital crime.
Proceedings of the 2011 eCrime Researchers Summit, 2011

2010
Using Budget-Based Access Control to Manage Operational Risks Caused by Insiders.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010

Identity Management's Misaligned Incentives.
IEEE Secur. Priv., 2010

Threat analysis of online health information system.
Proceedings of the 3rd International Conference on Pervasive Technologies Related to Assistive Environments, 2010

DigiSwitch: design and evaluation of a device for older adults to preserve privacy while monitoring health at home.
Proceedings of the ACM International Health Informatics Symposium, 2010

2009
Mental models of privacy and security.
IEEE Technol. Soc. Mag., 2009

A privacy-aware architecture for a Web rating system.
IBM J. Res. Dev., 2009

The portal monitor: a privacy-enhanced event-driven system for elder care.
Proceedings of the Persuasive Technology, Fourth International Conference, 2009

A Risk Based Approach to Limit the Effects of Covert Channels for Internet Sensor Data Aggregators for Sensor Privacy.
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009

Mitigating Inadvertent Insider Threats with Incentives.
Proceedings of the Financial Cryptography and Data Security, 2009

Design for Trust in Ambient and Ubiquitous Computing.
Proceedings of the Autonomic and Trusted Computing, 6th International Conference, 2009

Hardening the Network from the Friend Within.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2008
Game-theoretic modeling and analysis of insider threats.
Int. J. Crit. Infrastructure Prot., 2008

A Life or Death InfoSec Subversion.
IEEE Secur. Priv., 2008

Diffusion and Adoption of IPv6 in the United States.
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008

2007
Mental Models of Computer Security Risks.
Proceedings of the 6th Annual Workshop on the Economics of Information Security, 2007

Virtual Economies: Threats and Risks.
Proceedings of the Financial Cryptography and Data Security, 2007

Mental Models of Security Risks.
Proceedings of the Financial Cryptography and Data Security, 2007

Economics of Identity Theft - Avoidance, Causes and Possible Cures.
Springer, ISBN: 978-0-387-34589-5, 2007

2006
Proof of Work can Work.
Proceedings of the 5th Annual Workshop on the Economics of Information Security, 2006

Reliable, Usable Signaling to Defeat Masquerade Attacks.
Proceedings of the 5th Annual Workshop on the Economics of Information Security, 2006

Security and Morality: A Tale of User Deceit.
Proceedings of the WWW'06 Workshop on Models of Trust for the Web (MTW'06), 2006

2005
Voting, vote capture & vote counting symposium.
Proceedings of the 2005 National Conference on Digital Government Research, 2005

2004
Pricing Security - A Market in Vulnerabilities.
Proceedings of the Economics of Information Security, 2004

Human Implications of Technology.
Proceedings of the Practical Handbook of Internet Computing., 2004

Digital identity.
IEEE Technol. Soc. Mag., 2004

The code of elections.
Commun. ACM, 2004

Mental Models of Computer Security.
Proceedings of the Financial Cryptography, 2004

Identity the Civic Scenario (Workshop report).
Proceedings of the 2004 Annual National Conference on Digital Government Research, 2004

Identity the Civic Scenario.
Proceedings of the 2004 Annual National Conference on Digital Government Research, 2004

2003
Code, coding and coded perspectives.
J. Inf. Commun. Ethics Soc., 2003

First Principles of Copyright for DRM Design.
IEEE Internet Comput., 2003

Access Denied.
IEEE Secur. Priv., 2003

Identity, authentication, and identifiers in digital government.
Proceedings of the 2003 International Symposium on Technology and Society, 2003

Panel Report: Open Code for Digital Government.
Proceedings of the 2003 Annual National Conference on Digital Government Research, 2003

2002
Law enforcement surveillance in the network society.
IEEE Technol. Soc. Mag., 2002

The Governance of Code: Open Land vs. UCITA Land.
SIGCAS Comput. Soc., 2002

Privacy Tradeoffs: Myth or Reality? Panel.
Proceedings of the Financial Cryptography, 6th International Conference, 2002

DRM: doesn't realy mean digital copyright management.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

Designing for Trust.
Proceedings of the Trust, 2002

2001
An Atomicity-Generating Protocol for Anonymous Currencies.
IEEE Trans. Software Eng., 2001

Code as Embedded Speech, Machine, and Service.
J. Inf. Law Technol., 2001

Limits To Certainty in QoS Pricing and Bandwidth
CoRR, 2001

Trust: A Collision of Paradigms.
Proceedings of the Financial Cryptography, 2001

Trust and Risk in Internet Commerce.
MIT Press, ISBN: 978-0-262-53197-9, 2001

2000
The internet as public space: concepts, issues, and implications in public policy.
SIGCAS Comput. Soc., 2000

Student paper competition (abstract only).
Proceedings of the Tenth Conference on Computers, 2000

1999
Web Security and Privacy: An American Perspective.
Inf. Soc., 1999

1997
Critical issues in Internet commerce.
IEEE Commun. Mag., 1997

Lilith: Scalable Execution of User Code for Distributed Computing.
Proceedings of the 6th International Symposium on High Performance Distributed Computing, 1997

1995
Token and Notational Money in Electronic Commerce.
Proceedings of the First USENIX Workshop on Electronic Commerce, 1995

1994
Providing Auditing While Protecting Privacy.
Inf. Soc., 1994

Privacy: from abstraction to applications.
SIGCAS Comput. Soc., 1994

1992
Networking strategy at traveler's insurance.
Proceedings of the 1993 Conference on Computer Personnel Research, 1992


  Loading...