30 Publications (Page 1 of 2)
2018
Security and Privacy in Online Social Networking: Risk Perceptions and Precautionary Behaviour
Schaik, PaulJansen, JurjenOnibokun, JosephCamp, Jean and Kusev, Petko
Computers in Human Behavior, 2018-01. | Journal Article
2017
Incompetents, criminals, or spies: Macroeconomic analysis of routing anomalies
Moriano, PabloAchar, Soumya and Camp, L. Jean
Computers & Security, vol. 70, pp. 334, September 2017. | Journal Article
 
Security and privacy in online social networking: Risk perceptions and precautionary behaviour
Van Schaik, PaulJansen, JurjenOnibokun, JosephCamp, Jean and Kusev, Petko
2017-10-09. | Journal Article
2014
Helping You Protect You
Sasse, M. AngelaPalmer, Charles CJakobsson, MarkusConsolvo, SunnyWash, Rick and Camp, L. Jean
IEEE Security & Privacy, vol. 12, (no. 1), pp. 42, 2014-Jan.-Feb.. | Journal Article
2013
How In-Home Technologies Mediate Caregiving Relationships in Later Life
Huber, Lesa LorenzenHuber, Lesa LorenzenLorenzen Huber, LesaShankar, KalpanaShankar, KalpanaShankar, KalpanaCaine, KellyCaine, KellyCaine, KellyConnelly, KayConnelly, KayConnelly, KayCamp, LJeanCamp, L. JeanCamp, L. JeanWalker, Beth AnnWalker, Beth AWalker, Beth AnnBorrero, LisaBorrero, Lisa and Borrero, Lisa
International Journal of Human-Computer Interaction, vol. 29, (no. 7), pp. 455, 7/3/2013. | Journal Article
 
Protecting the Internet from Dictators: Technical and Policy Solutions to Ensure Online Freedoms
Bowman, Warigia and Camp, L
The Innovation Journal, vol. 18, (no. 1), pp. 1-23, 2013. | Journal Article
2012
Aging, Privacy, and Home-Based Computing: Developing a Design Framework
Shankar, KCamp, L. JConnelly, K and Huber, L
IEEE Pervasive Computing, vol. 11, (no. 4), pp. 54, 2012-Oct.-Dec.. | Journal Article
2011
Privacy, Technology, and Aging: A Proposed Framework
Lorenzen Huber, LesaLorenzen-huber, LesaBoutain, MaryCamp, L. JShankar, Kalpana and Connelly, Kay H
Ageing International, vol. 36, (no. 2), pp. 232-252, 2011. | Journal Article
 
Reconceptualizing the Role of Security User
Camp, L.
Daedalus, vol. 140, (no. 4), pp. 107, 20111001. | Journal Article
 
Security Risk Management Using Incentives
Liu, DebinLiu, DebinLi, NinghuiLi, NinghuiWang, XiaoFengWang, XiaoFengCamp, Jean and Camp, L. J
IEEE Security & Privacy, vol. 9, (no. 6), pp. 28, 2011-Nov.-Dec.. | Journal Article
2010
Identity Management's Misaligned Incentives
Camp, Jean
IEEE Security & Privacy, vol. 8, (no. 6), pp. 94, 2010-Nov.-Dec.. | Journal Article
2009
A privacy-aware architecture for a Web rating system
Viecco, CTsow, A and Camp, L. J
IBM Journal of Research and Development, vol. 53, (no. 2), pp. 7:16, 2009-03-00. | Journal Article
2008
Game-theoretic modeling and analysis of insider threats
Liu, DebinWang, XiaoFeng and Camp, Jean
International Journal of Critical Infrastructure Protection, vol. 1, pp. 80, 2008. | Journal Article
2007
Security and Usability [Guest Editor's Introduction]
Camp, L. Jean
IEEE Technology and Society Magazine, vol. 26, (no. 1), pp. 24, 2007-Spring. | Journal Article
2005
Voting, vote capture & vote counting symposium
Camp, L. JBowman, Warigia and Friedman, Allan
ACM International Conference Proceeding Series; Vol. 89: Proceedings of the 2005 national conference on Digital government research : Atlanta, Georgia; 15-18 May 2005. 2005. | Conference Proceeding
2004
Looking to the Internet for models of governance
Vincent, Charles and Camp, Jean
Ethics and Information Technology, vol. 6, (no. 3), pp. 173, 20040900. | Journal Article
 
Thailand at the crossroads
Camp, L. JMao, Fu-Shoun and Chowdhury, Mridul
International Journal of Technology, Policy and Management, vol. 4, (no. 2), pp. 116-135, 2004. | Journal Article
2003
Code, coding and coded perspectives
Camp, L
Journal of Information, Communication & Ethics in Society, vol. 1, (no. 1), pp. 49-60, 2003. | Journal Article
2002
Law enforcement surveillance in the network society
Chan, S. and Camp, L. J
IEEE Technology and Society Magazine, vol. 21, (no. 2), pp. 22-30, 2002. | Journal Article
2001
Code as speech: A discussion of Bernstein v. USDOJ, Karn v. USDOS, and Junger v. Daley in light of the U.S. Supreme Court's recent shift to Federalism
Camp, Jean and Lewis, K
Ethics and Information Technology, vol. 3, (no. 1), pp. 33, 20010300. | Journal Article
 
Deregulating the local loop: The telecommunications regulation path less chosen as taken by Bangladesh
Camp, L. J and Anderson, Brian L
International Journal of Technology Policy and Management, vol. 1, (no. 1), pp. 100-114, 2001. | Journal Article
 
Universal Service in a Ubiquitous Digital Network
Camp, L. J and Tsang, Rose P
Ethics and Information Technology, vol. 2, (no. 4), pp. 211-221, 2001. | Journal Article
2000
The evolution of US telecommunications infrastructure
Mc Adams, Alan KMcAdams, AlanCamp, JeanCamp, JeanDivakaruni, Shastri and Divakaruni, Shastri
info, vol. 2, (no. 2), pp. 110, 20000401. | Journal Article
 
The internet as public space
Camp, Jean and Chien, Y
ACM SIGCAS Computers and Society, vol. 30, (no. 3), pp. 19, 09-01-2000. | Journal Article
 
the world in 2010: many new entrants
Camp, Jean
Info, vol. 2, (no. 2), pp. 186, 2000-04-01. | Journal Article