30 Publications (Page 1 of 2)
2018
Security and Privacy in Online Social Networking: Risk Perceptions and Precautionary BehaviourSchaik, Paul⋅Jansen, Jurjen⋅Onibokun, Joseph⋅Camp, Jean and Kusev, PetkoComputers in Human Behavior, 2018-01.
| Journal Article
2017
Incompetents, criminals, or spies: Macroeconomic analysis of routing anomaliesMoriano, Pablo⋅Achar, Soumya and Camp, L. JeanComputers & Security, vol. 70, pp. 334, September 2017.
| Journal Article
Security and privacy in online social networking: Risk perceptions and precautionary behaviourVan Schaik, Paul⋅Jansen, Jurjen⋅Onibokun, Joseph⋅Camp, Jean and Kusev, Petko2017-10-09.
| Journal Article
2014
Helping You Protect YouSasse, M. Angela⋅Palmer, Charles C⋅Jakobsson, Markus⋅Consolvo, Sunny⋅Wash, Rick and Camp, L. JeanIEEE Security & Privacy, vol. 12, (no. 1), pp. 42, 2014-Jan.-Feb..
| Journal Article
2013
How In-Home Technologies Mediate Caregiving Relationships in Later LifeHuber, Lesa Lorenzen⋅Huber, Lesa Lorenzen⋅Lorenzen Huber, Lesa⋅Shankar, Kalpana⋅Shankar, Kalpana⋅Shankar, Kalpana⋅Caine, Kelly⋅Caine, Kelly⋅Caine, Kelly⋅Connelly, Kay⋅Connelly, Kay⋅Connelly, Kay⋅Camp, LJean⋅Camp, L. Jean⋅Camp, L. Jean⋅Walker, Beth Ann⋅Walker, Beth A⋅Walker, Beth Ann⋅Borrero, Lisa⋅Borrero, Lisa and Borrero, LisaInternational Journal of Human-Computer Interaction, vol. 29, (no. 7), pp. 455, 7/3/2013.
| Journal Article
Protecting the Internet from Dictators: Technical and Policy Solutions to Ensure Online FreedomsBowman, Warigia and Camp, LThe Innovation Journal, vol. 18, (no. 1), pp. 1-23, 2013.
| Journal Article
2012
Aging, Privacy, and Home-Based Computing: Developing a Design FrameworkShankar, K⋅Camp, L. J⋅Connelly, K and Huber, LIEEE Pervasive Computing, vol. 11, (no. 4), pp. 54, 2012-Oct.-Dec..
| Journal Article
2011
Privacy, Technology, and Aging: A Proposed FrameworkLorenzen Huber, Lesa⋅Lorenzen-huber, Lesa⋅Boutain, Mary⋅Camp, L. J⋅Shankar, Kalpana and Connelly, Kay HAgeing International, vol. 36, (no. 2), pp. 232-252, 2011.
| Journal Article
Reconceptualizing the Role of Security UserCamp, L.Daedalus, vol. 140, (no. 4), pp. 107, 20111001.
| Journal Article
Security Risk Management Using IncentivesLiu, Debin⋅Liu, Debin⋅Li, Ninghui⋅Li, Ninghui⋅Wang, XiaoFeng⋅Wang, XiaoFeng⋅Camp, Jean and Camp, L. JIEEE Security & Privacy, vol. 9, (no. 6), pp. 28, 2011-Nov.-Dec..
| Journal Article
2010
Identity Management's Misaligned IncentivesCamp, JeanIEEE Security & Privacy, vol. 8, (no. 6), pp. 94, 2010-Nov.-Dec..
| Journal Article
2009
A privacy-aware architecture for a Web rating systemViecco, C⋅Tsow, A and Camp, L. JIBM Journal of Research and Development, vol. 53, (no. 2), pp. 7:16, 2009-03-00.
| Journal Article
2008
Game-theoretic modeling and analysis of insider threatsLiu, Debin⋅Wang, XiaoFeng and Camp, JeanInternational Journal of Critical Infrastructure Protection, vol. 1, pp. 80, 2008.
| Journal Article
2007
Security and Usability [Guest Editor's Introduction]Camp, L. JeanIEEE Technology and Society Magazine, vol. 26, (no. 1), pp. 24, 2007-Spring.
| Journal Article
2005
Voting, vote capture & vote counting symposiumCamp, L. J⋅Bowman, Warigia and Friedman, AllanACM International Conference Proceeding Series; Vol. 89: Proceedings of the 2005 national conference on Digital government research : Atlanta, Georgia; 15-18 May 2005. 2005.
| Conference Proceeding
2004
Looking to the Internet for models of governanceVincent, Charles and Camp, JeanEthics and Information Technology, vol. 6, (no. 3), pp. 173, 20040900.
| Journal Article
Thailand at the crossroadsCamp, L. J⋅Mao, Fu-Shoun and Chowdhury, MridulInternational Journal of Technology, Policy and Management, vol. 4, (no. 2), pp. 116-135, 2004.
| Journal Article
2003
Code, coding and coded perspectivesCamp, LJournal of Information, Communication & Ethics in Society, vol. 1, (no. 1), pp. 49-60, 2003.
| Journal Article
2002
Law enforcement surveillance in the network societyChan, S. and Camp, L. JIEEE Technology and Society Magazine, vol. 21, (no. 2), pp. 22-30, 2002.
| Journal Article
2001
Code as speech: A discussion of Bernstein v. USDOJ, Karn v. USDOS, and Junger v. Daley in light of the U.S. Supreme Court's recent shift to FederalismCamp, Jean and Lewis, KEthics and Information Technology, vol. 3, (no. 1), pp. 33, 20010300.
| Journal Article
Deregulating the local loop: The telecommunications regulation path less chosen as taken by BangladeshCamp, L. J and Anderson, Brian LInternational Journal of Technology Policy and Management, vol. 1, (no. 1), pp. 100-114, 2001.
| Journal Article
Universal Service in a Ubiquitous Digital NetworkCamp, L. J and Tsang, Rose PEthics and Information Technology, vol. 2, (no. 4), pp. 211-221, 2001.
| Journal Article
2000
The evolution of US telecommunications infrastructureMc Adams, Alan K⋅McAdams, Alan⋅Camp, Jean⋅Camp, Jean⋅Divakaruni, Shastri and Divakaruni, Shastriinfo, vol. 2, (no. 2), pp. 110, 20000401.
| Journal Article
The internet as public spaceCamp, Jean and Chien, YACM SIGCAS Computers and Society, vol. 30, (no. 3), pp. 19, 09-01-2000.
| Journal Article
the world in 2010: many new entrantsCamp, JeanInfo, vol. 2, (no. 2), pp. 186, 2000-04-01.
| Journal Article