[ Publications of year 2007 ]
Articles in journals or book chapters (9) |
-
Kay Connelly and L. Jean Camp.
Beyond Consent: Privacy in Ubiquitous Computing (Ubicomp).
In Digital Privacy: Theory, Technologies and Practices eds,
pages 332--348.
Auerbach Publications,
2007.
Keywords: Aging, Human-Centered Computing, user studies, Privacy, IoT. [bibtex-entry] -
Sabrina De Capitani di Vimercati,
Stefanos Gritzalis,
Costas Lambrinoudakis,
Alessandro Acquisti,
L. Jean Camp,
and Kay Connelly.
Beyond Consent: Systematic Design for Privacy in Ubicomp.
In Digital Privacy: Theory, Technologies, and Practices,
pages 327--343.
Auerbach Publications,
2007.
Keywords: Aging. [bibtex-entry] -
Farzeneh Asgapour,
Debin Liu,
and L. Jean Camp.
Mental Models of Computer Security Risks.
Financial Cryptography and Data Security Lecture Notes in Computer Science,
4886:367--377,
2007.
Note: Usable Security 07.
Keywords: Mental Models, Human-Centered Security, Economics of Security. [bibtex-entry] -
Farzaneh Asgharpour,
Debin Liu,
and L. Jean Camp.
Mental models of security risks.
Financial Cryptography and Data Security,
pp 367--377,
2007.
Note: Springer. [bibtex-entry] -
L. Jean Camp.
Reliable, Usable Signaling to Defeat Masquerade Attacks.
ISJLP,
3:211,
2007.
Note: HeinOnline.
Keywords: Economics of Security. [bibtex-entry] - L. Jean Camp. Security and Usability [Guest Editor's Introduction]. Technology and Society Magazine, IEEE, 26(1):3--24, 2007. [bibtex-entry]
- L. Jean Camp, Farzaneh Asgharpour, Debin Liu, and IN Bloomington. Experimental evaluations of expert and non-expert computer users’ mental models of security risks. Proceedings of WEIS 2007, 2007. [bibtex-entry]
-
Alla Genkina and L. Jean Camp.
Social networks.
Phishing and countermeasures: Understanding the increasing problem of electronic identity theft, M. Jakobsson and S. Myers, Eds. Hoboken: John Wiley & Sons,
pp 523--550,
2007.
Note: Wiley Online Library.
Keywords: Phishing. [bibtex-entry] -
Alex Tsow,
Camilo Viecco,
and L. Jean Camp.
Privacy-aware architecture for sharing web histories.
IBM Systems Journal,
3:5--13,
2007.
Keywords: Economics of Security. [bibtex-entry]
Conference publications (1) |
- Preeti Hariharan, Farzaneh Asgharpour, and L. Jean Camp. Nettrust—recommendation system for embedding trust in a virtual realm. In Proceedings of the ACM Conference on Recommender Systems, 2007. Citeseer. [bibtex-entry]
Posters and Presentations (2) |
-
DongInn Kim.
OSCAR 5.1 on PlayStation 3.
Presentation at Super Computing Conference (SC 2007), Reno, Nevada,
October 2007.
Keywords: OSCAR, high performance computing, cluster. [bibtex-entry] - L. Jean Camp. Economics of identity theft: Avoidance, causes and possible cures. Springer, 2007. [bibtex-entry]
BACK TO INDEX
Disclaimer:
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
Last modified: Mon Aug 19 14:38:55 2024
Author: teamhats.
This document was translated from BibTEX by bibtex2html and is customized by IU IoT House