[ Publications of year 2020 ]

Articles in journals or book chapters (8)
  1. Marthie Grobler, M.A.P. Chamikara, Jacob Abbott, Surya Nepal, and Cecil Paris. The Importance of Social Identity on Password Formulation. Personal and Ubiquitous Computing, November 2020.
    Keywords: Passwords, Security, Privacy, International, Authentication. [bibtex-entry]

  2. L. Jean Camp, Ryan Henry, Tadayoshi Kohno, Shrirang Mare, Steven Myers, Shwetak Patel, and Joshua Streiff. Towards a Secure IoT: Directions for IoT Research. IEEE Security \& Privacy, 2020.
    Note: To appear. [bibtex-entry]

  3. Jayati Dev. Discussing Privacy and Surveillance on Twitter: A Case Study of COVID-19. arXiv preprint arXiv:2006.06815, 2020.
    Keywords: Privacy, Computational Social Science, Social Network Privacy, human factors, surveillance, internet governance. [bibtex-entry]

  4. Jayati Dev, Emilee Rader, and Sameer Patil. Why Johnny Can’t Unsubscribe: Barriers to Stopping Unwanted Email. 2020.
    Keywords: Privacy, Emails, User Study, human factors. [bibtex-entry]

  5. Shakthidhar Reddy Gopavaram, Omkar Bhide, and L. Jean Camp. Can You Hear Me Now? Audio and Visual Interactions That Change App Choices. Frontiers in Psychology, 11:2227, 2020.
    Keywords: Mobile Privacy, Marketplace. [bibtex-entry]

  6. Hilda Hadan, Laura Calloway, Shakthidhar Gopavaram, Shrirang Mare, and L. Jean Camp. Ameriecan Privacy Perceptions in the COVID Pandemic. Annals of Disaster Risk Sciences, 2020. [bibtex-entry]

  7. Shrirang Mare, Franziska Roesner, and Tadayoshi Kohno. Smart Devices in Airbnbs: Considering Privacy and Security for both Guests and Hosts. Proceedings on Privacy Enhancing Technologies (PoPETs), 2020(2), 2020.
    Note: To appear. [bibtex-entry]

  8. Behnood Momenzadeh, Helen Dougherty, Matthew Remmel, Steven Myers, and L Jean Camp. Best Practices Would Make Things Better in the IoT. IEEE Security & Privacy, 2020.
    Keywords: IoT. [bibtex-entry]

Conference publications (8)
  1. Hilda Hadan and Sameer Patil. Understanding Perceptions of Smart Devices. In International Conference on Financial Cryptography and Data Security, 08 2020.
    Keywords: IoT. [bibtex-entry]

  2. DongInn Kim, Vafa Andalibi, and L Jean Camp. Fingerprinting Edge and Cloud Services in IoT. In Systematic Approaches to Digital Forensic Engineering, City University of New York (CUNY), New York City, May 2020. IEEE Computer Society.
    Keywords: Fingerprinting, IoT. [bibtex-entry]

  3. Jacob Abbott and Sameer Patil. How Mandatory Second Factor Affects the Authentication User Experience. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, CHI ’20, New York, NY, USA, pages 1–13, 2020. Association for Computing Machinery.
    Keywords: Security, UX, 2FA. [bibtex-entry]

  4. L Jean Camp. All Security Is Good (s): Design Guidance for Economics. In Enigma, 2020. Usenix.
    Keywords: Mental Models, Network Engineering, Economics of Security. [bibtex-entry]

  5. Sanchari Das, Jacob Abbott, Shakthidhar Gopavaram, Jim Blythe, and L Jean Camp. User-Centered Risk Communication for Safer Browsing. In Proceedings of the First Asia USEC-Workshop on Usable Security, In Conjunction with the Twenty-Fourth International Conference International Conference on Financial Cryptography and Data Security, 2020.
    Keywords: Phishing, Risk Communication, Privacy, Security. [bibtex-entry]

  6. Jayati Dev and L Jean Camp. User Engagement with Chatbots: A Discursive Psychology Approach. In Proceedings of the 2nd Conference on Conversational User Interfaces, pages 1--4, 2020.
    Keywords: AI, Social Network Privacy, human factors. [bibtex-entry]

  7. Jayati Dev, Pablo Moriano, and L Jean Camp. Lessons Learnt from Comparing WhatsApp Privacy Concerns Across Saudi and Indian Populations. In Sixteenth Symposium on Usable Privacy and Security (\{SOUPS\} 2020), pages 81--97, 2020.
    Keywords: Privacy, International, Social Network Privacy, human factors. [bibtex-entry]

  8. Behnood Momenzadeh, Shakthidhar Gopavaram, Sanchari Das, and L Jean Camp. Bayesian Evaluation of User App Choices in the Presence of Risk Communication on Android Devices. In International Symposium on Human Aspects of Information Security and Assurance, pages 211--223, 2020. Springer.
    Keywords: Mobile Privacy, Usable Privacy, Usability. [bibtex-entry]

Posters and Presentations (2)
  1. Andy Puga and Joshua Streiff. Hunting for the Internet of Things: An Educational BLE Scavanger Hunt Game. IU GROUPS STEM Poster (IN), July 2020.
    Keywords: IoT. [bibtex-entry]

  2. Lizbeth Roque, Emily Sung, and Joshua Streiff. Gaming For Cyber Kids: Building Manipulative Cyber Educational Games for Grades 7th-8th. IU GROUPS STEM Poster (IN), July 2020.
    Keywords: IoT. [bibtex-entry]



This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

Last modified: Mon Nov 7 18:21:14 2022
Author: teamhats.

This document was translated from BibTEX by bibtex2html and is customized by IU IoT House