Curriculum Vitae
Download my Bio
Download my CV
EDUCATION
Doctor of Philosophy in Engineering and Public Policy
Carnegie Mellon University
August 1996
Thesis: Privacy & Reliability in Internet Commerce
Masters of Science in Electrical Engineering
University of North Carolina at Charlotte
August 1991
Bachelor of Arts in Mathematics & Bachelor of Science in Electrical Engineering
University of North Carolina at Charlotte
May 1989
TEACHING
for course details see the courses section of this web site
Courses Taught
Indiana: Organizational Informatics
Harvard: Analytic frameworks; Internet strategy - law, business, policy
Courses Developed & Taught
Indiana, graduate: Economics of Information Security, Social Informatics of Security
Indiana, undergraduate: Introduction to Cybersecurity, Organizational Informatics of Security
Cross-listed: Health, Technology and Aging
Harvard, graduate: Security and privacy, Internet privacy, Internet commerce, information commerce,
design for values, information policy, communications policy, telecommunications
modeling and policy analysis (engineering-economics)
Executive Education Topics
Indiana: Policy and economics of information security
Harvard: Open source, privacy, managing security, economics of information security
EMPLOYMENT & AFFILIATIONS
Professor
School of Informatics and Computing
Indiana University
digital trust, social and economic implications of security..
Congressional Fellow
Office of Rep. Etheridge
IEEE-USA Congressional Fellow
Jan 4, 2010 - Jan 1, 2011
portfolio: cybersecurity, defense, military construction, transportation and telecommunications. Please feel free to ask me about my IEEE-USA/AAAS fellowship experience. The most common description I have heard from colleagues is, life-changing
.
Associate Professor
School of Informatics
Indiana University
August 2004 - May 2011
digital trust, social and economic implications of security..
Associate Professor
Kennedy School of Government
Harvard University
May 2002 - May 2004
digital trust, networked risk, values in as embedded in digital technology.
Visiting Scientist
Advanced Network Architecture Group
Laboratory for Computer Science
Massachusetts Institute of Technology
January 2003 -May 2003 (spring semester, Harvard research leave)
embedded values in network protocols.
Visiting Scholar
Centre for Philosophy and ICT
Erasmus University
May 2003- August 2003. (summer semester, Harvard research leave)
construction of identity through digital identifiers in the Netherlands and
European Community.
Assistant Professor
Kennedy School of Government
Harvard University
November 1997 - May 2002
interdisciplinary trust research, design for values.
Senior Member of the Technical Staff
Infrastructure & Network Research
Sandia National Laboratories
Livermore, CA
September 1996 - November 1997
meta-computing, trust, clustering, computer security.
Research Assistant
Department of Engineering and Public Policy
Carnegie Mellon University
Pittsburgh, PA
August 1993 - August 1996
analyzed Internet commerce systems along the axes of reliability, privacy
and security; my research moved the frontier of the conflict between reliability,
which requires logging, and privacy. work resulted in two patents.
Research Assistant
Software Engineering Institute, Computer Emergency
Response Team
Carnegie Mellon University
Pittsburgh, PA
May 1993 - August 1993
policy research assistant; evaluated the state of case law and statutory law
with respect to the needs of system operators
Research Assistant
Information Networking Institute
Carnegie Mellon University
Pittsburgh, PA
August 1991 - May 1993
developed teaching materials and a case study in telecommunications management
Patricia Harris Fellow
Optical Interconnects & Computer Generated Holography Laboratory
University of North Carolina at Charlotte
Charlotte, NC
August 1989 - August 1991
evaluated guided wave and free space mechanisms for interconnects of multi-chip
modules; designed optical devices on silicon using simple modifications of
standard layout tools
Assistant Maintenance Engineer
Catawba Nuclear Station
Duke Power Company
Rock Hill, SC
August 1988 - August 1989
implemented and developed preventive maintenance programs; system responsibilities
included in-core thermocouples and fire protection; assured regulatory compliance
to top
HONORS & ACTIVITIES
Honors
IEEE/AAAS Congressional Fellow, 2010
Member USACM Executive Council
President & Chair of the
President of the International Financial
Cryptography Association. 2003 - 2009.
Board of Governors, IEEE Society for the Social Implications of Technology,
elected 2003 - 2006.
Dean's Leadership Committee, Carnegie Institute
of Technology, 2002 - 2004.
Director, Computer Professionals for Social Responsibility 1999 - 2003.
Five Year Program Review Committee of the National Science Foundation CAREER
Program 2001.
Renaissance Weekend participant.
Senior Member of the IEEE, elected in September 1999.
to top
Keynotes & Plenary Presentations
"Beyond Usability and Economics: Translucent Security", UNC SLIS Kilgore Lecture, (Chapel Hill, NC) 17 March 2014
"Efficient Methods to Guard Against Online Risk", Executive Office of the President, National Security Staff, (Washington, DC) 27 September 2013.
"Building Trust by Communicating Risk", UIC Distinguished Lecture Series (Chicago, IL) 14 November 2013.
"Beyond usability: Security Interactions as Risk Perceptions", Trustbuilders and Trusbusters Workshop, (Newcastle, UK) 26 July 2013. Keynote
"Policy Issues in Identity Management", Identity Management in an Open Society", US Department of State, Meridian Conference Center, 20 November 2009
"Policy Issues in Identity Management", Identity Management in an Open Society, US Department of State, Meridian Conference Center, 20 November 2009
"Design for Trust in Ambient & Ubiquitous Computing", Sixth International Conference on Ubiquitous Intelligence and Computing, (Brisbane, AU) 6-8 July 2009.
"Hardening the Network from The Friend Within", 14th Australasian Conference on Information Security and Privacy (Brisbane, AU) 4-6 July 2009.
(Plenary) "Possible Policies for the Final Eights", ARIN XXIII (San Antonio, TX) 26-29 April 2009.
"IPv6 Adoption in Autonomous Systems and Advertised Routers", RIPE 56 (Berlin, DE) 5-9 May 2008. (Plenary)
"IPv6 Diffusion Through the Lens of Economics of Security", ARIN XXI (Denver, CO) 7 April 2007. (Plenary)
"Identity in Context", IBM Identity Management Summit,
(Victoria, BC Canada) April 2004.
"Unintended Consequences of Design", The International Society for Optical Engineering (SPIE) Photonics East (Boston MA) 5-8 November 2000. (Plenary)
"When Data = Death, Security for Medical Information Systems",
The IEEE Information Technology Applications in Biomedicine Third
International Conference (Arlington VA) 9-10 November 2000.
to top
Appointments & Affiliations
Director, Masters of Science in Security Informatics, 2008-2014.
Indiana University Representative, Institute for Information Infrastructure Protection, 2006-2009; 2012-2013.
Visiting Scientist, Dept. of Computer Science, University City London, Summer 2007.
National Research Council and Election Assistance Commission, Technical Workshop
for Chief Technology Officers, June 2005.
Member, ACM Task Force on Job Migration, 2004 - 2005.
Selected participant, CRA-W Cohort for Associate Professors Project, June
2005.
Affiliate, National Center for Digital Government, 2001- 2004.
Visiting Professor, Erasmus University, summer 2003.
Visiting Scientist, Laboratory for Computer Science, MIT (spring semester,
research leave).
Editorial Board, International Journal of Technology Policy and Management
1999 - present.
IEEE Committee on Communications and Information Policy (CCIP) 1999 -present.
Member USACM 1996-present.
Research Affiliate, Internet and Telecom Convergence
Consortium, MIT.
Visiting Professor, Centre for Computing and Social Responsibility, UK, summer
2001.
Granted Educational Leave with Benefits, Duke Power Company 1989.
to top
Additional Professional Service
Editorial Board, International
Journal of Technology Policy and Management, 1999-2000.
NSF REviewer, various programs and dates.
Economic & Social Research Council Reviewer, United Kingdom, 2003 - 2004.
Reviewer: Communications of the ACM, IEEE Transactions on Computing, Mgt.
Science, RAND Journal etc.
Special Issue Editor: Designing Across the Digital Divide, The Journal of
Information, Communication and Ethics in Society (ICES). Vol. 1, No. 3. May
2003.
Special Issue Editor: Usable Privacy and Security, IEEE TEchnology and Society, March 2007.
Special Issue Editor: Cybersecurity, I/S A Journal of Law and Policy for the Information Society. Winter 2006.
Special Issue Editor: Cybersecurity, I/S A Journal of Law and Policy for the Information Society. Winter 2007.
to top
Program Chair
USEC 12, a workshop affiliated with Financial Cryptography 2012 Jim Blythe, co-Chair.
Security and Privacy in Medical and Home-Care Systems, a workshop affiliated with ACM CCS
The 36th Research Conference on Communication, Information and Internet Policy 26 - 28 September 2008, George Mason University School of Law, (Arlington, VA).
The I3P Workshop on Insider Threats in the Networked World an invitation-only workshop combining researchers and industry to define the parameters of the insider threat, 15 - 16 April 2008, Duke Conference Center (Durham, NC).
DIMACS Workshop on Economics of Information Security18 - 19 January 2007, DIMACS, Rutgers University,, (Piscataway, NJ)
co-chair: Alessandro Acquisti.
The Fourth Workshop on Economics of Information Security (WEIS05) , 1-3
June 2005, Kennedy School of Government, Harvard University (Cambridge, MA)
General Chair: Allan Friedman.
The Voting, Vote Capture, and Vote Counting Symposium, a one day
event on design of process, technology and their interaction in voting systems.
June, 2004 Kennedy School of Government, Harvard University (Cambridge, MA).
General Chair: Allan Friedman.
Identity: The Civic Scenario a two day workshop on the role of identifiers in digital government. April 2003 Kennedy School of Government,
Harvard University (Cambridge, MA).
CPSR Annual Meeting 2002, Shrinking World, Expanding Net:
Designing Technology for Developing Nations 5 October 2002 (Cambridge, MA)
Also General Chair.
to top
Program Committees
PETS 2012, SOUPS 2012, TRUST SES 2012, WEIS 2012, WSCS a IEEE Security \& Privacy Workshop.
ETHICOMP 2011, WEIS 2011, CFP Research Track 2011, PETS 2011.
Financial Cryptography and Data Security 2010 (FC10), Workshop on Economics of Information Security (WEIS 2010), 4th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2010. All others refused due to sabbatical.
Third IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2009); Symposium on Usable Privacy and Security (SOUPS 2009); Workshop on the Economics of Security (WEIS 2009); Security Measurement and Metrics (MetriSec2009); 2009 World Congress on Privacy, Security, Trust and the Management of e-Business (CONGRESS09);ACM Computer and Communications Security Conference (ACM CCS).
ACM Computer and Communications Security Conference (ACM CCS 2008);
Seventh Workshop on the Economics of Information Security (WEIS 2008);
Fourth Quality of Protection Workshop (QoP 2008);
The Tenth ETHICOMP International Conference on the Social and Ethical Impacts of Information and Communication Technology (ETHICOMP 2008);
Third Annual APWG eCrime Researchers Summit. ECrime 2008
Sixth Workshop on the Economics of Information Security (WEIS 07); Privacy Enhancing Technologies Workshop 2007 (PETS 2007); Dependability and Security in e-Government (DeSeGov 2007); ETHICOMP 2007.
iTrust 2006; The Fifth Workshop on the Economics of Information Security (WEIS 06); Workshop on the Economics of
Securing the Information Infrastructure; Workshop on Privacy in the Electronic Society (WPES 2006); Workshop on Digital Rights Management (DRM 2006); Second European Conference on Mobile Goverment (EURO Mgov 2006).
Workshop on Privacy Enhancing Technologies; Workshop on Digital Rights Management Systems, 2005; (WPES) 2005; ETHICOMP 2005.
Workshop on Digital Rights Management Systems, 2004; Privacy Enhancing Technologies (WPES)
2004; ITS European Regional Conference 2004; ETHICOMP 2004; Third Workshop on the Economics of Information Security (WEIS 04).
Workshop on Digital Rights Management Systems, 2003; Fifth International Conference
of Electronic Commerce, 2003; Privacy Enhancing Technologies, 2003; ETHICOMP
2003; Second Workshop on the Economics of Information Security (WEIS 03).
Telecommunications Policy Research Conference, 2001; Inaugural Workshop on the Economics of Information Security.
The Internet and Society, Harvard University, 2000; Telecommunications
Policy Research Conference 2000.
Organizing Committee: IEEE CCIP "The
Evolution of the US Telecommunications Infrastructure over the Next Decade",
Ithaca, NY. "Governing
the Commons: Future of Global Internet Administration Conference",
sponsored by Computer Professionals for Social Responsibility 1999.
to top
PATENTS
Patent Number 6,317,729: Anonymous Certified Delivery with SET.
Patent Number 6,076,078: Anonymous Atomic Transactions.
Provisional Patent: Peer to Peer Information to Enhance Security.
Provisional Patent, Pharming Detection Using Personal Histories, 2007.
Patent, Privacy-Aware Portal Monitor, 2008, under submission.
to top
PUBLICATIONS
Books
L. Jean Camp, Trust & Risk in Internet Commerce, MIT Press, Winter (Cambridge,
MA) 2000.
L. Jean Camp & Stephen Lewis, "The Economics of Information Security" Kluwer Academic Press, 2004.
L. Jean Camp & M. Eric Johnson, "Financial and Medical Identity Theft" Springer 2011
to top
Book Chapters
Timothy Kelley & L Jean Camp, "Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections", Selected Papers from WEIS 2012, Springer (Berlin, DE) Ch. 8 pp 159-184. (Previous version published in WEIS, see below)
Andrew Patrick and L Jean Camp, "Risk Mitigation From the Release of Personal
Identity Information", Privacy Protection Measures and Technologies in Business
Organizations: Aspects and Standards. IGI Global. 2011
J. Duncan & L. Jean Camp, "The Portal Monitor: A Privacy-Aware Event-Driven System for Elder Care" Rocker, C., Ziefle, M. (Eds.) Smart Healthcare Applications and Services: Developments and Practices. IGI Publishing (Niagara Falls, NY) 2010
L. Jean Camp & Kay Connelly, "Privacy in Ubicomp" Digital Privacy: Theory, Technologies and Practices eds. Alessandro Acquisti,
Sabrina De Capitani di Vimercati, Stefanos Gritzalis and Costas Lambrinoudakis, Taylor & Frances. (New York, NY (2007) Previous Version Available,
L. Jean Camp "Varieties of Software and their Implications for Effective Democratic Government",
Oxford University Press (Oxford, UK) 2006.
Allan Friedman & L Jean Camp, "Security in Peer to Peer
Systems", The Handbook of Information Security ed. Hossein Bidgoli, John
Wiley & Sons (Hoboken, New Jersey) 2004.
L. Jean Camp & Ka-Ping Yee "Human implications of technology",
Practical Handbook of Internet Computing ed. M. P. Singh, CRC Press (New York,
NY) Winter 2003.
L. Jean Camp Peer to Peer Systems,
The Internet Encyclopedia ed. Hossein Bidgoli, John Wiley & Sons (Hoboken,
New Jersey) 2003.
L. Jean Camp, "Design
for Trust", Trust, Reputation and Security: Theories and Practice,
ed. Rino Falcone, Springer-Verlang (Berlin) 2003.
L. Jean Camp & Carlos Osorio,"Privacy Enhancing Technologies for
Internet Commerce", Trust in the Network Economy, Springer-Verlag (Berlin)
2003.
L. Jean Camp, Cathleen McGrath & Helen Nissenbaum, "Trust: A Collision
of Paradigms", Proceedings of Financial Cryptography, Lecture Notes in
Computer Science, Springer-Verlag (Berlin, Germany) Fall 2001. Slides and
notes from the conference available.
L. Jean Camp, "The Shape of the Network", Governance in a Globalizing
World, ed. J. Donahue, Brookings Press (Washington, DC) Summer 2001.
L. Jean Camp & Y.T. Chien, "The Internet as Public Space: Concepts,
Issues and Implications in Public Policy", Readings
in Cyberethics, eds. R. Spinello and H Tavani, Jones and Bartlett Publishers
(Sudbury , MA) January 2001. Previously published in ACM Computers & Society,
September 2000. Previous version
available
L Jean Camp, "The Post-Convergence Consumer", Creative
Destruction, ed. Lee McKnight, MIT Press, Winter (Cambridge, MA) 2000.
L. Jean Camp, "Community Considered", democracy.com? Governance
in a Networked, World Hollis Publishing (Hollis, NH) 1999.
L. Jean Camp, D. Riley, "Bedrooms,
barrooms & board rooms on the Internet: the failure of media types in
cyberspaces", Selected Papers from the 1996 Telecommunications Policy
Net Trust and Trust on the Web, Research Conference, eds. G.L. Rosston & D. Waterman; Lawrence Earlbaum
Associates (NY, NY) 1997. A previous version presented at Virtue & Virtuality:
A Conference on Gender, Law and Cyberspace, MIT Cambridge, MA, 19-20
L. Jean Camp, "The systers mailing list", Wired Women: Gender and
New Realities in Cyberspace, eds., L. Cherny & E. Weise, The Seal Press,
(Seattle, WA) January 1996.
M. Feldman, L. Jean Camp, J. Stack & J. Morris, "Optical interconnects",
Chapter 7: Design Issues in Optical Computing, ed. John Lee, Cambridge University
Press (Cambridge, MA) 1993.
to top
Journals
Vaibhav Garg, Thomas Koster and L. Jean Camp, "Cross-country Analysis of Spambots", EURASIP Journal on Information Security, 2013:3 doi:10.1186/1687-417X-2013-3
Vaibhav Garg, L. Jean Camp, Lesa Lorenzen-Huber, Kalpana Shankar, Kay Connelly, "Privacy Concerns in Assisted Living Technologies", Annals of Telecommunications, Volume 69, Issue 1-2 , pp 75-88 doi: 10.1007/s12243-013-0397-0
Warigia Bowman, L Jean Camp, "Protecting the Internet from Dictators: Technical and Policy Solutions to Ensure Online Freedoms", The Innovation Journal, 18(1), 2013, article 3.
Lesa Huber, Kalpana Shankar, Kelly E. Caine, Katherine H. Connelly, L. Jean Camp, Beth Ann Walker, and Lisa Borerro. In-home Technologies and Caregiver Relationships
, International Journal of Human-Computer Studies, 29 (7), 441-455 (2013).
V. Garg, L. Huber, L. J. Camp, K. Connelly, Risk Communication Design for Older Adults
, Gerontechnology 2012; 11(2).
Caine, K. E., Zimmerman, C. Y., Schall-Zimmerman, Z., Hazlewood, W. R., Camp, L. J., Connelly, K. H., Huber, L. L, & Shankar, K, 2011, DigiSwitch: A device to allow older adults to monitor and direct the collection and transmission of health information collected at home
. Journal of Medical Systems Vol. 35, No. 5, 1181-1195.
Zheng Dong & L Jean Camp, 2011, The decreasing marginal value of network size
, ACM SIGCAS, Vol. 41 (1).
Debin Liu, Ninghui Li, XiaoFeng Wang, and L. Jean Camp, Security Risk Management using Incentives
, IEEE Security & Privacy. Vol. 9, No. 6: 20-28 (2011).
L. Jean Camp, "Re-conceptualizing the Role of Security User,
of Security User
, Daedalus, Fall 2011, Vol. 140, No. 4: 93–107.
K. Shankar, Camp, L.J, Lorenzen-Huber, L, Connelly, K, "Aging, Privacy, and Home-Based Computing: Designing for Privacy", IEEE Pervasive Computing (accepted) 2011.
Lorenzen-Huber, L. Boutain, M., Camp, L.J., Shankar, K., Connelly, K., "Privacy, Independence, and Relationships: Older Adults Perceptions of Home-Based Ubiquitous Technologies", Ageing International (accepted) 2010.
Debin Lui, Jean Camp, XiaoFeng Wang, "Using Budget-Based Access Control to Manage Operational Risks Caused by Insiders", Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Vol 1, No 1 (2010) Previously version published at MIST 2010.
Debin Liu, XiaoFeng Wang and L. Jean Camp, "Game Theoretic Modeling and Analysis of Insider Threats", International Journal of Critical Infrastructure Protection (IJCIP) accepted (Previously presented at IFIP International Conference on Critical Infrastructure Protection, March 16-19, 2008, Washington, D.C.)
Alex Tsow, Camilo Viecco, and L. Jean Camp, Privacy-Aware Architecture for Sharing Web Histories
, IBM Systems Journal, accepted.
L. Jean Camp, Net Trust: Signaling Malicious Web Sites
, I/S A Journal of Law and Policy in the Information Society, 2007, Vol. 3, No 2: 211-235.
L Jean Camp, "Mental Models of Security," IEEE Technology & Society, 2009) No 3:28, IEEE, Pages: 37-46..
L Jean Camp, "Economics of Information Security" I/S A Journal of Law and Policy in the Information Society, Vo. 2, No. 2., pp 190-205.
L Jean Camp, "Digital Identity," IEEE Technology & Society, 2004, Vol. 23, No 3 pp. 34 - 41. Previous version available.
L. Jean Camp & Charles Vincent, "Looking to the Internet for Models of Governance" Ethics and Information Technology, 2004, Vol. 6, No. 3, pp. 161-174.
L. Jean Camp, Fu-Shoun Mao & Mridul Chowdhury, "Thailand at the Crossroads
in ICTs" International Journal of Technology Policy and Management. Vol. 4, No. 2, pp. 116-135.
L. Jean Camp, "Principles for Design of Digital Rights Management Systems"IEEE
Internet ComputingVol. 6, No. 3 pp. 59-65, May 2003. Previous
version available as "DRM Doesn't Really Mean Copyright" in
the peer-reviewed Proceedings of the 2003 ACM Conference on Computer and Communications
Security, ACM Press (NY NY).
L. Jean Camp, "Code, Coding and Coded Perspectives", Journal of
Information, Communication and Ethics in Society Vol. 1, Jan. 2003, pp. 49-59.
(Previously published in the abstract-refereed conference "Code, Coding,
and Coded Perspectives", Association of Internet Researchers, Lawrence
, Kansas, September 2000.)
L. Jean Camp & Serena Syme,"The Governance of Code: Open Land vs.
UCITA Land" ACM SIGCAS Computers and Society, September 2002, Vol. 32,
No. 3.
Also available at The ACM Computers and Society Page
L. Jean Camp, "An atomicity-generating layer for anonymous currencies",
IEEE Transactions on Software Engineering, March 2001, Vol. 27, No. 3, pp.
272-278.
L. Jean Camp & Serena Syme, "A
Coherent Intellectual Property Model of Code as Speech, Embedded Product,
or Service", Journal of Information Law and Technology, Vol. 2, 2001.
L. Jean Camp & Y.T. Chien, "The Internet as Public Space: Concepts,
Issues and Implications in Public Policy", ACM Computers & Society,Vol.
30, No. 3, September 2000. (Also selected for inclusion in Readings in Cyberethics
as noted above.)
L Jean Camp & Ken Lewis, "Code as Speech: a discussion of Bernstein
v. USDOJ, Karn v. USDOS, and Junger v Daley in light of the U.S. Supreme Court's
shift to Federalism",Ethics and Information Technology, March 2001. Vol.
1, No. 2, pp. 1-13. (Earlier version presented at CEPE 2000:Computer Ethics:
Philosophical Inquiry, Dartmouth College Hanover, NH (USA) 13-16 July 2000,
an abstract-referred conference. Draft
version available.)
L. Jean Camp, "The World in 2010: Many New Entrants", info: the
journal of policy, regulation and strategy for telecommunications, information
and media, Vol. 2 No. 2, April 2000, 167-186.
L. Jean Camp & Brian Anderson, "Deregulating the Local Loop: The
Telecommunications Regulation Path Less Chosen as Taken by Bangladesh"
, International Journal
of Technology Policy and Management Vol. 1, Issue 1. Earlier version presented
at INET 2000.
L. Jean Camp & Rose Tsang, "Universal
service in a ubiquitous digital network", Journal of Ethics and Information
Technology, accepted. Previous version presented at INET 1999, an Internet
Society abstract-refereed conference .
L. Jean Camp, "Democratic
Implications of Internet Protocols" The Information Society, Vol.
15, 249 -256, 1999. Previous version presented by invitation at DIMACS Workshop
on Design for Values: Ethical, Social and Political Dimensions of Information
Technology, February 28 - March 1, 1998; Princeton University, Department
of Computer Science, Princeton NJ. Initial version presented as "Privacy
on the Web", at the peer-referred conference Symposium on Network &
Distributed System Security, 10-11 February 1997, San Diego, CA.
L. Jean Camp & Marvin Sirbu, "Critical issues in Internet commerce",
IEEE Communications, May, 1997.
L. Jean Camp, "Privacy: from abstraction to applications", Computers
& Society, Sept. 1994, Vol. 24, No. 3, 8-15.
L. Jean Camp & J. D. Tygar, "Providing
auditing and protecting privacy", The Information Society, March
1994, Vol. 10, No. 1, 59-72
L Jean Camp, R. Sharma & M. Feldman, "Guided-wave and free-space
optical interconnects for parallel-processing systems: a comparison",
Applied Optics, 10 September 1994, 6169-6180. Also presented at the Optical
Society of America's Annual Meeting, November 1990, Boston MA.
to top
Peer Reviewed Conferences
Kalpana Shankar, Lesa Huber. L.Jean Camp, Kelly E. Caine, and Katherine H. Connelly, "Finding the Older User in Home-Based Computing Studies", International Society on Gerontechnology* International Symposium of Automation and Robotics in Construction (ISG*ISARC 2012). Eindhoven, Netherlands, June 26-29, 2012.
Huber, L., Camp, L.J., Garg, V., Borrero, L. (2012). "Staying safe online: How to protect your money and your privacy", Association for Gerontology in Higher Education 38th Annual Meeting. Arlington, VA.
Zheng Dong and L. Jean Camp, "Policy Proposal: Limit Address Allocation to extend the Lifetime of IPv4 in the APNIC Region", ACM ACSAC Workshop on Governance of Technology, Information, and Policies (GTIP 10), 6-10 Dec. 2010 (Austin, TX).
V, Garg, N. Husted & L. Jean Camp, The Smuggling Theory Approach to Organized Digital Crime
, APWG eCrime Researchers Summit (San Diego, CA) 8-9 November 2011. Best Paper Award.
J. Blythe, L. Jean Camp & V. Garg, "Targeted Risk Communication for Computer Security", 2011 International Conference on Intelligent User Interfaces, (Palo Alto, CA) 13-16 February 2011.
Zack Zimmerman & L Jean Camp, "Elder-friendly Design Effects on Acceptance of Novel Technologies", Elderly Interaction Design CHI; CHI 2010 Workshop, (Atlanta GA.) 4 April 2010.
A. Nematzadeh & L.Jean Camp, "Threat Analysis of Online Health Information System", Proceeding of 3rd International Conference on Pervasive Technologies Related to Assistive Environments, 2010 (Samos, GR) 23-25 June 2010.
Jean Camp, Rui Wang, & Xiaoyong Zhou "Four Paths Forward for IPv6 Adoption", Second International Symposium on Global Information Governance (ISGIG), Conflict and Collaboration in Compliance, Governance and Risk (Prague) 15-16 September 2009.
J. Duncan, L. Jean Camp & William R. Hazlewood "The Portal Monitor: A Privacy-Enhanced Event-Driven System for Elder Care", Persuasive 2009 (Claremont, CA) 26-29 April 2009.
Camillo Viecco & L Jean Camp, "A Risk-Based Approach to Limit the Effects of Covert Channels for Internet Sensor Data Aggregators for Sensor Privacy", IFIPTM09: IFIP International Conference on Trust Management, (West Lafayette, IN) June 15-19, 2009
Debin Liu, L Jean Camp & XiaoFeng Wang, "Mitigating Insider Threats with Incentives", Financial Cryptography and Data Security, (Barbados, BWI) 23-26 February 2009.
Hillary Elmore, L Jean Camp & Brandon Stephens, IPv6 Diffusion
, WEIS 2008, 22-25 September 2008 (New Haven, CN).
Alex Tsow, Faraneh Asgarpour & L. Jean Camp Usability Analysis and User Trust Behaviors of a Social Networking Toolbar
, APWG eCrime Researchers Summit (Pittsburgh, PA) 4 -5 Oct. 2007.
Farzeneh Asgapour, Debin Liu and L. Jean Camp, Risk Communication in Computer Security using Mental Models
, WEIS 2007, (Pittsburgh, PA) 5-6 June 2007.
Farzeneh Asgapour, Debin Liu and L. Jean Camp, "Mental Models of Computer Security Risks: Experimental Results", Usable Security 07, (Tobago) 16 February 2007.
L. Jean Camp, "Reliable Usable Signaling to Defeat Masquerade Attacks" WEIS 2006 (Cambridge, MA) 26-28 June 2006.
Debin Liu & L Jean Camp, "Proof of Work Can Work" WEIS 2006 (Cambridge, MA) 26-28 June 2006.
L. Jean Camp, Cathleen McGrath & Alla Genkina, Security and Morality: A Tale of User Deceit,
Models of Trust for the Web MTW'06, (Edinburgh, Scotland) 22 May 2006.
Serena Chan & L. Jean Camp, "Towards
Coherent Regulation of Law Enforcement Surveillance in the Network Society
", Ethicomp: The Social and Ethical Impacts of Information and Communications
Technologies, Technical University of Gdansk (Gdansk, Poland) 18-20 June 2001,
Vol. 2 pp. 86-101. Previous version presented at The 5th International Conference
on Technology, Policy, and Innovation, Delft, The Netherlands, 2001.
Serena Syme & L. Jean Camp, "The
Governance of Code: Code as Governance", Ethicomp: The Social and
Ethical Impacts of Information and Communications Technologies, Technical
University of Gdansk (Gdansk, Poland) 18-20 June 2001, Vol. 1, pp. 86-101.
L. Jean Camp & Catherine Wolfram, "Pricing
Security", Proceedings of the CERT Information Survivability Workshop,
(Boston, MA) Oct. 24-26, 2000, pp. 31-39.
D. Evensky, A. Gentile, L. Jean Camp, & R. Armstrong, "Lilith:
Scalable Execution of User Code for Distributed Computing", Proceedings
of The 6th IEEE International Symposium on High Performance Distributed Computing,
HPDC-6 (Portland, OR) August 1997, pp. 123-145.
L. Painton, T. Gaylor, L. Jean Camp, C. Phillips, G. Wyss, "Risk-based
characterization of network vulnerability", CERT Information Survivability
Workshop (San Diego, CA) 12 - 13 February 1997, pp. 62-64.
L. Jean Camp, Michael Harkavy, J.D. Tygar and Bennet Yee, "Anonymous
atomic transactions," 2nd Annual USENIX Workshop on Electronic Commerce
Proceedings (Oakland, CA) November 1996, pp. 123-134.
L. Jean Camp, M. Sirbu & J. D. Tygar, "Token
and notational money in electronic commerce", USENIX Workshop on
Electronic Commerce, July 1995, New York, NY, 1-12. A previous version presented
at the Telecommunications Policy Research Conference (Solomons
Island, MA) October 1994, pp. 1-12.
L. Jean Camp & D. Riley, "Protecting
an unwilling electronic populace", Proceedings of the Fifth Conference
of Computers Freedom and Privacy (San Francisco, CA) 28-31 March 1995, pp.
120-139.
L. Jean Camp & M. Sirbu, "Networking strategy at The Travelers' Insurance",
Proceedings of ACM SIG in Computer Personnel Research Conference (St. Louis, MO) April 1993,
pp. 450-463.
to top
Abstract-Refereed Conferences
V. Garg & L. Jean Camp, End User Perception of Online Risk Under Uncertainty
, Hawaii International Conference On System Sciences, (Manoa, HI) 4-7 January 2012.
Huber, L., Borrero, L., Walker, B.A., Shankar, K., Caine, K., Connelly, K., Camp, L.J. (2011, November). How Older Adults Use Information Technology to Reduce Caregiver Burden, Gerontological Society of America 64th Annual Scientific Meeting, Boston, MA.
Huber, L.L., Camp, L.J., Connelly, K.H., Shankar, K., Caine, K., Hazlewood, W., Zimmerman, Z. "A Privacy Framework for Evaluating In-Home Technologies", Conference Proceedings, Gerontological Society of America 63rd Annual Scientific Meeting, (New Orleans, LA). 2010.
Camp, L.J., Huber, L..L., Borrero, L. "What do older adults understand about their privacy risks while online?" Conference Proceedings, Gerontological Society of America 63rd Annual Scientific Meeting, (New Orleans, LA). 2010.
Jean Camp, Four Paths Forward for IPv6 Adoption
, TPRC (Arlington, VA) 28 Sept. 30 Sept. 2008.
L. Jean Camp & Debin Liu, Proof of Work {cannot, can, does currently} Work
, TPRC (Arlington, VA) 28 Sept. 30 Sept. 2007.
L. Jean Camp, L. Huber, & Kay Connelly, "Designing Ubicomp with Privacy Constraints Defined by Users", Nurturing Technologies in the Domestic Environment: Feeling Comforted, Cared for, and Connected at Home, (Orange County, CA) 18 Sept. 2006. Workshop held conjunction with Ubicomp 2006.
L. Jean Camp, & Kay Connelly "Beyond Consent: Implications of Ubicomp for Privacy", TPRC 2006, (Washington, DC) 29 Sept.
L. Jean Camp, Peer Production of Privacy and Security Information
Ethical Surveillance, 8-10 June 2005 (Austin TX).
L. Jean Camp, Kay Connelly, & Kalpana Shankar, Design for Privacy: Towards a Methodological Approach to Trustworthy Ubicomp Design
, Ethicomp 2005, 12 -14 September, 2005
(Linkoping, Sweden).
L. Jean Camp & Allan Friedman, Peer Production of Security & Privacy Information,
Telecommunications Policy Research Conference e (Alexandria, VA) 23- 25 September 2005.
Allan Friedman, Alla Genkina and L Jean Camp, Net Trust: Designing for Human Trust Perception
, Trustworthy Interfaces for Passwords and Personal Information (Stanford University, Palo Alto, CA)13 June 2005.
L. Jean Camp, Warigia Bowman & Allan Friedman Voting, Vote Capture & Vote Counting Symposium,
Proceedings of the 6th Annual National Conference on Digital Government Research, 15-18 May 2005 (Atlanta, GA). pp. 198 .
Jean Camp & Allan Friedman, Peer patching
, 24th Army Science Conference, 28 November - 2 December 2004 (Orlando, FL)
Jean Camp, "Digital Identity", International Symposium on Technology
and Society 2003--Crime Prevention and Security 24 - 26 September 2003 (Amsterdam,
2003).
L Jean Camp & Allan Friedman, "Peer to Peer Security" Telecommunications
Policy Research Conference, 19-21 September 2003.
Allan Friedman & L. Jean Camp, "Making Security Manifest" Second
Workshop on the Economics of Information Security, College Park, MA. May 2003.
L. Jean Camp, " 'Marketplace incentives to prevent piracy': An incentive
for security?", First Workshop on the Economics of Information Security,
Berkeley, CA. May 2002.
L. Jean Camp & Carolyn Gideon, "Certainty in Bandwidth or Price"
The 29th Research Conference on Communication, Information and Internet Policy,
Washington, D.C. Oct. 2000.
L. Jean Camp, "Code, Coding, and Coded Perspectives", Association
of Internet Researchers, Lawrence , Kansas, September 2000.
L. Jean Camp, "Privacy and Security Implications of Quality of Service
Mechanisms", Workshop On Internet Service Quality Economics, MIT Cambridge.
MA. 2-3 December 1999.
L. Jean Camp & B. Anderson, "Expansion
of Telecommunications Infrastructure in Emerging Nations: The Case of Bangladesh",
Telecommunications Policy Research Conference, Alexandria, VA. 25-26 Sept.
1999.
L. Jean Camp, D.A. Evensky, "Survivability
& Trust", Research Directions for the Next Generation Internet,
12-14 May 1997, Washington, DC.
to top
Editor Selected & Invitation Only
V. Garg & L. Jean Camp, "How Safe is Safe Enough: The Online Version", Workshop on Security and Human Behavior, (Cambridge, UK) 28-29 June 2010.
V. Garg & L. Jean Camp, Privacy, Ubicomp, and Older Adults
, Workshop on Security and Human Behavior, (Carnegie Mellon, PA) 17-18 June 2011.
Identity and Incentives
, IEEE Security & Privacy, fall 2010.
A Life or Death InfoSec Subversion
, IEEE Security & Privacy, with Camilo Viecco. November 2008.
Book review of "Power and Security in the Information Age", Information, Communication and Society, 2008
Extended Abstract: Mental Models of Computer Security
, Proceedings of Financial Cryptography 2004, Lecture Notes in Computer Science, Springer-Verlag (Berlin) September 2004.
J. Camp "Access Denied" IEEE
Security & Privacy vol. 1, no. 5, Sept./Oct. 2003, pp. 82-85.
"A Review of Financial Cryptography," CIPHER, Issue 42, May 1, 2001.
"A Review of the Seventh Financial Cryptography," CIPHER, April
2003.
Internet Voting is No Solution, Belfer Center for Science and International Affairs. November 28, 2000.
Editorial, "Computer Attacks have focused on the wrong issues,"
Boston Globe. February 17, 2000
Book review: "The Internet Economy: Access, Taxes, and Market Structure.
by Alan Wiseman", Brookings Institution Press, 2000, pp. 128
L. Jean Camp & Brain Anderson, "Grameen
Phone: Empowering the Poor through Connectivity", iMP: The Magazine
on Information Impacts (December 1999).
L. Jean Camp, "Why do Phil’s travails matter?", IEEE IMPACT,
August 1995: 1.
L. Jean Camp, "Cryptography policy needs another look", IEEE Spectrum,
June 1994, 15-16.
Additional Writings
Voting and Vote Counting: The Annotated Best Practices
, Institute of Politics, Harvard, (Cambridge, MA) July 2004. Distributed as model research by Kennedy School of Government of Harvard Universiy to all attendees of the Democratic National Convention.
Identity in Digital Government: A Research Agenda
, Harvard, Nov. 2003. Over 200 copies distributed by the National Science Foundation and the Kennedy School of Government.
Special Issue Editor: Designing Across the Digital Divide, The Journal of
Information, Communication and Ethics in Society (ICES). Vol. 1, No. 3. May
2003.
R. Morris & L. Jean Camp, "Wine on the Wire: Press Coverage of Internet
Commerce", Shorenstein Center on the Press, Politics, & Public Policy
Computer Security Mental Models of Experts and non-Experts Working Paper Series, 6 Feb. 1999.
to top
Selected Presentations & Panels
"Translucent Security", School of Computer Security Seminar Series, University of North Carolina Charlotte, (Charlotte, NC) 3 May 2011.
"Human Behaviors and Security", Cyber Security: Exploring the Human Element (National Press Club, Washington, DC) 8 March 2011.
"People Taking Risks Online", Security and Human Behaviors, (MIT, Cambridge MA) 11 June 2009.
"Online Economics Behaviors: Taking Risks", Security Economics Workshop (London, UK) 26 June 2009.
"Exactly What Is it That You Will Never Admit? Challenges to User-Centered Research in Privacy", Privacy Methodologies Workshop (London, UK) 23 - 24 March 2009
"Economics of Security: What is Next?", Financial Cryptography (Christ Church, Barbados) 25 Feb. 2009.
Security@Home
Sun Microsystems Intellectual Desserts (Menlo Park, CA) 13 November 2008.
Security & Elders
, IPSI Public Lecture Series, University of Toronto (Toronto CN) 10 Nov. 2008.
Security & Human Behavior
, Interdisciplinary Studies in Information Security (Monte Verita, SW),7-11 July 2008.
Mental Models of Security
Security & Human Behavior, (MIT Cambridge MA) 2-3 July 2008.
The Inadvertent Insider: Communicating Security Risks
, The Insider Threat in the Networked World, (Durham, NC) 15-16 April 2008.
IPv6 Diffusion: Learning from Economics of Security
, CISCO Workshop on the Future of Internet Addressing, (Milpitas, CA) 4 March 2008. with Hillary Elmore.
Communicating Security State using Net Trust
, Google Research Seminar, (Mountain View, CA) 28 February 2008. with Brandon Stephens
"Privacy in ubiquitous and home computing", University City London / British Telecom Computer Science Seminar, (Ipswich, UK) 1 August 2007.
"Computer Security and Human Trust Behaviors", 2007 Decision and Risk Analysis Conference: Convergence Between Finance and Industry (Dallas, TX) 22-23 May 2007.
"Net Trust: A Status Report", Symantec Research Seminar (Mountain View, CA) 4 May 2007.
"Trust and Trusted Computing", Usable Security (Tobago, BWI) 16 February 2007.
"Games, Privacy, Identity: The Coming Collision of Virtual & Real", Financial Cryptography (Tobago, BWI) 14 February 2007.
"Defeating Spam One Account at a Time", Money Finance and Growth: XV International Tor Vergata Conference on Banking and Finance, Faculty of Economics (Rome, IT) 13 December 2006.
"Net Trust: Embedding Identity in Social Context", Oxford Internet Institute Research Seminar, (Oxford, UK) 7 December 2006.
"Economics of Identity", 7th Annual Privacy and Security Workshop: Your Identity Please: Identity Theft and Identity Management in the 21st Century, Toronto School of Law (Toronto, CN) 2-3 November 2006.
"Economics of Security as Design Parameters", School of Information Research Seminar, University of Michigan, (Ann Arbor, MI) 26 October 2006.
"Beyond Usable Security: A Matter of Trust, An Issue of Risk" Workshop on Future Directions for NSF Cyber Trust Program (Pittsburgh, PA) 5-7 October, 2006.
"Hard Wired Identity", Oxford Internet Institute (Balliol College, Oxford, UK) 29 Sept. 2006.
"Open Code, Free Software, and Governance" Open Soource in the International Marketplace, University of Pennsylvannia School of Law Symposium (Philadelphia, PA) 31 March 2006.
"Forging Trust Using Reliable Economic Signals" CERIAS Annual Symposium, (West Lafayette, IN) 22 March 2006.
Human Autonomy in an Age of Active Aware Pervasive Computing
, AAAS Annual Meeting (Chicago, IL) 16-20 February 2006.
Net Trust
Google Security Group Research Presentation, (Mountain View, CA) 3 August 2005.
Privacy in Voting
, Technical Workshop for Chief Technology Officers, National Research Council and Election Assistance Commission (Washington, DC) June 2005.
Allan Friedman, Alla Genkina and L Jean Camp, Social and Network Trust,
DIMACS (New Brunswick NJ) 14 - 15 April 2005.
Economics of Information Security
, CFI-CIRT, BMO Financial Group (Toronto CN) 10 February 2005.
The Economics of Information Security
, 13th CACR Information Security Workshop & 5th Annual Privacy and Security Workshop: Privacy and Security: Seeking the Middle Path, Centre for Applied Cryptographic Research, (Toronto, Canada) October 2004.
Economics of Information Security,
Second Workshop on the Economics of Peer-to-Peer Systems, Harvard University, (Cambridge, MA) June 2004.
Identity as a Social and Technical Construct,
14th IEEE-RIDE (Research Issues on Data Engineering) Workshop Web Services for E-Commerce and E-Government Applications (Boston, MA) 28 April 2004.
"Open Source, Myth Versus Reality", Massachusetts Executive Leadership
Forum (Boston, MA) 15 October 2003.
Panel organized and Chaired, Privacy in Internet Commerce, International Conference
on Electronic Commerce (Pittsburgh, PA) 1 - 3 October 2003.
"Identity in Digital Government; Best Practices and a Research Agenda"
Max Planck Institute (Bonn, Germany) 14 July 2003.
Using
Ethnographic Data to Evaluate Technical Design WebShop 2003. University
of Maryland (College Park, MA) 3-5 June 2003.
"Privacy by Design: A Study in Cooperation Across Disciplines ",
Workshop on Public Values, Systems Design, and the Public Domain , Sponsored
by the Programme in Cooperative Media Law & Policy, Oxford. (Bellagio, Italy) 3-7 March
2003.
"Trust and Risk in Internet Commerce: Design for Trust", The Institute
for Security Technology Studies, Dartmouth University (Dartmouth,
NH) January 17, 2003.
"Design for Values in DRM ", MITRE (Bedford, NH) 15 November 2002.
"Thailand At the Crossroads in Telecommunications ", International
Conference on Science, Technology and Innovation BCSIA, KSG. Harvard (Cambridge, MA) 23-
24 September 2002.
"Digital Rights Management as Design for Trust " Public Design Workshop
, NYU Law School (NY, NY) 13-14 September 2002.
"Returning to First Principles: The Functions of Copyright as a Basis
for DRM in 2002" Cryptography and Information Security Group Seminar (MIT Cambridge, MA) April 2002.
"Privacy Models and Business Plans" Internet & Telecoms Convergence (Cambridge, MA) 16 January 2002.
"Security
and Privacy Lost",Nurturing
the Cybercommons 1981-2001 (Ann Arbor, Michigan) 19-21 October 2001.
"Design for Values in Computer Science" Georgia Institute of Technology
College of Computing Departmental Seminar (Atlanta, GA) September 2001.
"IT & the Developing World", Global Governance of Technology:
Meeting the Needs of Developing Countries, Harvard University (Cambridge MA) April 2001.
"Internet Governance, From Meritocracy to Adhocracy to Bureaucracy",
CPSR Internet Governance Workshop (Washington, D.C.) September, 1999. Presentation.
"Digital Signatures: Beware the False Simplicity of Analogy",
Massachusetts Continuing Legal Education, Massachusetts Bar Association (Boston, MA) 1998.
"Issues in Electronic Commerce", NationsBank Architecture & Infrastructure
Group (Charlotte, NC) 18 December 1996.
"Democratic Implications of Web Privacy", Computer Science Department
Colloquium, University of Massachusetts at Amherst (Amherst, MA) November 19, 1997
"Cryptography, Privacy and Health Data", Privacy, Information Technology
and Health Care, Virginia Health Policy Center, U. of Virginia (Charlottesville, VA) 24- 25 July
1996.
"Options, Opportunities & Obstacles in Electronic Commerce",
Future of Electronic Banking, Columbia Institute of Tele-Information, Columbia
University (New York, NY) 23 October 1996.
Panel participant, "Web Privacy & Anonymity" Symposium on Network
and Distributed Systems Security (San Diego, CA) 1997.
"Internet Commerce: Evolution, Examples and Evaluation", Banking
on the New Paradigm (Tokyo, Japan) December 1995
"Encryption Policy and American Economic Interests", Annual Meeting
of the Association of Former Intelligence Agents, (Baltimore
MA) October 1993.
to top