[ Publications of year 2020 ]

Articles in journals or book chapters (9)
  1. Marthie Grobler, M.A.P. Chamikara, Jacob Abbott, Surya Nepal, and Cecil Paris. The Importance of Social Identity on Password Formulation. Personal and Ubiquitous Computing, November 2020.
    Keywords: Passwords, Security, Privacy, International, Authentication.
    @Article{ grobler2020importance,
    title = {The Importance of Social Identity on Password Formulation},
    author = {Grobler, Marthie and Chamikara, M.A.P. and Abbott, Jacob and Nepal, Surya and Paris, Cecil},
    journal = {Personal and Ubiquitous Computing},
    year = {2020},
    month = {November},
    publisher = {Springer},
    url = {https://doi.org/10.1007/s00779-020-01477-1},
    doi = {10.1007/s00779-020-01477-1},
    keywords = {Passwords, Security, Privacy, International, Authentication} }

  2. L. Jean Camp, Ryan Henry, Tadayoshi Kohno, Shrirang Mare, Steven Myers, Shwetak Patel, and Joshua Streiff. Towards a Secure IoT: Directions for IoT Research. IEEE Security \& Privacy, 2020.
    Note: To appear.
    @Article{ camp19-iot,
    presort = {b},
    author = {L. Jean Camp and Ryan Henry and Tadayoshi Kohno and Shrirang Mare and Steven Myers and Shwetak Patel and Joshua Streiff},
    journal = ieee-sp,
    note = {To appear},
    title = {Towards a Secure {IoT}: Directions for {IoT} Research},
    year = {2020},
    url = {https://www.shrirangmare.com/papers/camp2020-iot.pdf} }

  3. Dalyapraz Dauletbak and Jongwook Woo. Big Data Analysis and Prediction of Traffic in Los Angeles.. KSII Transactions on Internet & Information Systems, 14(2), 2020.
    @Article{ dauletbak_big_2020,
    title = {Big Data Analysis and Prediction of Traffic in Los Angeles.},
    author = {Dauletbak, Dalyapraz and Woo, Jongwook},
    journal = {KSII Transactions on Internet \& Information Systems},
    volume = {14},
    number = {2},
    year = {2020} }

  4. Jayati Dev, Emilee Rader, and Sameer Patil. Why Johnny Can’t Unsubscribe: Barriers to Stopping Unwanted Email. 2020.
    Keywords: Privacy, Emails, User Study, human factors.
    @Article{ devjohnny,
    title = {Why Johnny Can’t Unsubscribe: Barriers to Stopping Unwanted Email},
    author = {Dev, Jayati and Rader, Emilee and Patil, Sameer},
    booktitle = {Proceedings of the CHI Conference on Human Factors in Computing Systems},
    year = {2020},
    organization = {ACM},
    keywords = {Privacy, Emails, User Study, human factors} }

  5. Jayati Dev. Discussing Privacy and Surveillance on Twitter: A Case Study of COVID-19. arXiv preprint arXiv:2006.06815, 2020.
    Keywords: Privacy, Computational Social Science, Social Network Privacy, human factors, surveillance, internet governance.
    @Article{ dev2020discussing,
    title = {Discussing Privacy and Surveillance on Twitter: A Case Study of COVID-19},
    author = {Dev, Jayati},
    journal = {arXiv preprint arXiv:2006.06815},
    year = {2020},
    keywords = {Privacy, Computational Social Science, Social Network Privacy, human factors, surveillance, internet governance} }

  6. Shakthidhar Reddy Gopavaram, Omkar Bhide, and L. Jean Camp. Can You Hear Me Now? Audio and Visual Interactions That Change App Choices. Frontiers in Psychology, 11:2227, 2020.
    Keywords: Mobile Privacy, Marketplace.
    @Article{ gopavaramcan,
    author = {Gopavaram, Shakthidhar Reddy and Bhide, Omkar and Camp, L. Jean},
    title = {Can You Hear Me Now? Audio and Visual Interactions That Change App Choices},
    journal = {Frontiers in Psychology},
    volume = {11},
    pages = {2227},
    year = {2020},
    url = {https://www.frontiersin.org/article/10.3389/fpsyg.2020.02227},
    doi = {10.3389/fpsyg.2020.02227},
    issn = {1664-1078},
    keywords = "Mobile Privacy, Marketplace" }

  7. Hilda Hadan, Laura Calloway, Shakthidhar Gopavaram, Shrirang Mare, and L. Jean Camp. Ameriecan Privacy Perceptions in the COVID Pandemic. Annals of Disaster Risk Sciences, 2020.
    @Article{ hhadan2020adrs,
    title = {Ameriecan Privacy Perceptions in the COVID Pandemic},
    author = {Hilda Hadan and Laura Calloway and Shakthidhar Gopavaram and Shrirang Mare and L. Jean Camp},
    journal = {Annals of Disaster Risk Sciences},
    year = {2020},
    vol = {3},
    no = {1} }

  8. Shrirang Mare, Franziska Roesner, and Tadayoshi Kohno. Smart Devices in Airbnbs: Considering Privacy and Security for both Guests and Hosts. Proceedings on Privacy Enhancing Technologies (PoPETs), 2020(2), 2020.
    Note: To appear.
    @Article{ mare20-airbnb,
    presort = {a},
    author = {Shrirang Mare and Franziska Roesner and Tadayoshi Kohno},
    entrysubtype = {None},
    journal = popets,
    note = {To appear},
    number = {2},
    title = {Smart Devices in {A}irbnbs: Considering Privacy and Security for both Guests and Hosts},
    volume = {2020},
    year = {2020},
    url = {https://www.shrirangmare.com/papers/mare2020-airbnb.pdf} }

  9. Behnood Momenzadeh, Helen Dougherty, Matthew Remmel, Steven Myers, and L Jean Camp. Best Practices Would Make Things Better in the IoT. IEEE Security & Privacy, 2020.
    Keywords: IoT.
    @Article{ momenzadeh2020best,
    title = {Best Practices Would Make Things Better in the IoT},
    author = {Momenzadeh, Behnood and Dougherty, Helen and Remmel, Matthew and Myers, Steven and Camp, L Jean},
    journal = {IEEE Security \& Privacy},
    year = {2020},
    publisher = {IEEE},
    keywords = "IoT" }

Conference publications (8)
  1. Hilda Hadan and Sameer Patil. Understanding Perceptions of Smart Devices. In International Conference on Financial Cryptography and Data Security, 08 2020.
    Keywords: IoT.
    @InProceedings{ hhadan2020iot,
    title = {Understanding Perceptions of Smart Devices},
    author = {Hilda Hadan and Sameer Patil},
    booktitle = {International Conference on Financial Cryptography and Data Security},
    year = {2020},
    month = {08},
    keywords = {IoT},
    url = {https://link.springer.com/chapter/10.1007/978-3-030-54455-3_8} }

  2. DongInn Kim, Vafa Andalibi, and L Jean Camp. Fingerprinting Edge and Cloud Services in IoT. In Systematic Approaches to Digital Forensic Engineering, City University of New York (CUNY), New York City, May 2020. IEEE Computer Society.
    Keywords: Fingerprinting, IoT.
    @InProceedings{ dikim20:block_pi,
    author = {DongInn Kim and Vafa Andalibi and L Jean Camp},
    title = {Fingerprinting Edge and Cloud Services in IoT},
    booktitle = {Systematic Approaches to Digital Forensic Engineering},
    year = 2020,
    address = {City University of New York (CUNY), New York City},
    month = {May},
    publisher = {IEEE Computer Society},
    url = {http://www.usablesecurity.net/projects/IoT/papers/Fingerprinting_IoT_Final.pdf},
    keywords = "Fingerprinting, IoT",
    institution = {Cisco, NSF} }

  3. Jacob Abbott and Sameer Patil. How Mandatory Second Factor Affects the Authentication User Experience. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, CHI ’20, New York, NY, USA, pages 1–13, 2020. Association for Computing Machinery.
    Keywords: Security, UX, 2FA.
    @InProceedings{ abbott2020mandatory,
    author = {Abbott, Jacob and Patil, Sameer},
    title = {How Mandatory Second Factor Affects the Authentication User Experience},
    year = {2020},
    isbn = {9781450367080},
    publisher = {Association for Computing Machinery},
    address = {New York, NY, USA},
    url = {https://doi.org/10.1145/3313831.3376457},
    doi = {10.1145/3313831.3376457},
    booktitle = {Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems},
    pages = {1–13},
    numpages = {13},
    keywords = {Security, UX, 2FA},
    location = {Honolulu, HI, USA},
    series = {CHI ’20} }

  4. L Jean Camp. All Security Is Good (s): Design Guidance for Economics. In Enigma, 2020. Usenix.
    Keywords: Mental Models, Network Engineering, Economics of Security.
    @InProceedings{ camp2020all,
    title = {All Security Is Good (s): Design Guidance for Economics},
    author = {Camp, L Jean},
    organization = {Usenix},
    booktitle = {Enigma},
    location = {San Franciso, CA},
    keywords = {Mental Models, Network Engineering, Economics of Security},
    year = {2020} }

  5. Sanchari Das, Jacob Abbott, Shakthidhar Gopavaram, Jim Blythe, and L Jean Camp. User-Centered Risk Communication for Safer Browsing. In Proceedings of the First Asia USEC-Workshop on Usable Security, In Conjunction with the Twenty-Fourth International Conference International Conference on Financial Cryptography and Data Security, 2020.
    Keywords: Phishing, Risk Communication, Privacy, Security.
    @InProceedings{ das2020user,
    title = {User-Centered Risk Communication for Safer Browsing},
    author = {Das, Sanchari and Abbott, Jacob and Gopavaram, Shakthidhar and Blythe, Jim and Camp, L Jean},
    booktitle = {Proceedings of the First Asia USEC-Workshop on Usable Security, In Conjunction with the Twenty-Fourth International Conference International Conference on Financial Cryptography and Data Security},
    year = {2020},
    keywords = {Phishing, Risk Communication, Privacy, Security} }

  6. Jayati Dev and L Jean Camp. User Engagement with Chatbots: A Discursive Psychology Approach. In Proceedings of the 2nd Conference on Conversational User Interfaces, pages 1--4, 2020.
    Keywords: AI, Social Network Privacy, human factors.
    @InProceedings{ dev2020user,
    title = {User Engagement with Chatbots: A Discursive Psychology Approach},
    author = {Dev, Jayati and Camp, L Jean},
    booktitle = {Proceedings of the 2nd Conference on Conversational User Interfaces},
    pages = {1--4},
    year = {2020},
    keywords = {AI, Social Network Privacy, human factors} }

  7. Jayati Dev, Pablo Moriano, and L Jean Camp. Lessons Learnt from Comparing WhatsApp Privacy Concerns Across Saudi and Indian Populations. In Sixteenth Symposium on Usable Privacy and Security (\{SOUPS\} 2020), pages 81--97, 2020.
    Keywords: Privacy, International, Social Network Privacy, human factors.
    @InProceedings{ dev2020lessons,
    title = {Lessons Learnt from Comparing WhatsApp Privacy Concerns Across Saudi and Indian Populations},
    author = {Dev, Jayati and Moriano, Pablo and Camp, L Jean},
    booktitle = {Sixteenth Symposium on Usable Privacy and Security ($\{$SOUPS$\}$ 2020)},
    pages = {81--97},
    year = {2020},
    keywords = {Privacy, International, Social Network Privacy, human factors} }

  8. Behnood Momenzadeh, Shakthidhar Gopavaram, Sanchari Das, and L Jean Camp. Bayesian Evaluation of User App Choices in the Presence of Risk Communication on Android Devices. In International Symposium on Human Aspects of Information Security and Assurance, pages 211--223, 2020. Springer.
    Keywords: Mobile Privacy, Usable Privacy, Usability.
    @InProceedings{ momenzadeh2020bayesian,
    title = {Bayesian Evaluation of User App Choices in the Presence of Risk Communication on Android Devices},
    author = {Momenzadeh, Behnood and Gopavaram, Shakthidhar and Das, Sanchari and Camp, L Jean},
    booktitle = {International Symposium on Human Aspects of Information Security and Assurance},
    pages = {211--223},
    year = {2020},
    organization = {Springer},
    keywords = {"Mobile Privacy", "Usable Privacy", "Usability"} }

Posters and Presentations (2)
  1. Andy Puga and Joshua Streiff. Hunting for the Internet of Things: An Educational BLE Scavanger Hunt Game. IU GROUPS STEM Poster (IN), July 2020.
    Keywords: IoT.
    @Misc{ puga2020_poster,
    title = "Hunting for the Internet of Things: An Educational BLE Scavanger Hunt Game",
    author = {Puga, Andy and Streiff, Joshua},
    keywords = {IoT},
    howpublished = {IU GROUPS STEM Poster (IN)},
    month = {July},
    year = {2020} }

  2. Lizbeth Roque, Emily Sung, and Joshua Streiff. Gaming For Cyber Kids: Building Manipulative Cyber Educational Games for Grades 7th-8th. IU GROUPS STEM Poster (IN), July 2020.
    Keywords: IoT.
    @Misc{ roque2020_poster,
    title = "Gaming For Cyber Kids: Building Manipulative Cyber Educational Games for Grades 7th-8th",
    author = {Roque, Lizbeth and Sung, Emily and Streiff, Joshua},
    howpublished = {IU GROUPS STEM Poster (IN)},
    month = {July},
    year = {2020},
    keywords = {IoT} }


BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Mon Aug 19 14:38:55 2024
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House