[ Publications of year 2022 ]

Articles in journals or book chapters (5)
  1. Jean Camp. Does Bidens cybersecurity order go far enough?. 2022.
    Keywords: SBOM, policy.
    @Article{ camp2022does,
    title = {Does Bidens cybersecurity order go far enough?},
    author = {Camp, Jean},
    year = {2022},
    publisher = {Brookings Institution},
    keywords = {SBOM, policy} }

  2. Sanchari Das, Christena Nippert-Eng, and L Jean Camp. Evaluating user susceptibility to phishing attacks. Information & Computer Security, 30(1):1--18, 2022.
    Keywords: phishing, user studies.
    @Article{ das2022evaluating,
    title = {Evaluating user susceptibility to phishing attacks},
    author = {Das, Sanchari and Nippert-Eng, Christena and Camp, L Jean},
    journal = {Information \& Computer Security},
    volume = {30},
    number = {1},
    pages = {1--18},
    year = {2022},
    publisher = {Emerald Publishing Limited},
    keywords = {phishing, user studies} }

  3. Jayati Dev, Lorraine Kisselburgh, and L Jean Camp. Privacy and Respectful Discourse in \{AI\} Chatbots. 2022.
    Keywords: labels, privacy.
    @Article{ dev2022privacy,
    title = {Privacy and Respectful Discourse in $\{$AI$\}$ Chatbots},
    author = {Dev, Jayati and Kisselburgh, Lorraine and Camp, L Jean},
    year = {2022},
    keywords = {labels, privacy} }

  4. Natnatee Dokmai, L Jean Camp, and Ryan Henry. Assisted Private Information Retrieval. Cryptology ePrint Archive, 2022.
    Keywords: cryptography, privacy.
    @Article{ dokmai2022assisted,
    title = {Assisted Private Information Retrieval},
    author = {Dokmai, Natnatee and Camp, L Jean and Henry, Ryan},
    journal = {Cryptology ePrint Archive},
    year = {2022},
    keywords = {cryptography, privacy} }

  5. Shakthi Gopavaram, Jayati Dev, and L Jean Camp. Creating Effective Labels. 2022.
    Keywords: labels, privacy.
    @Article{ gopavaram2022creating,
    title = {Creating Effective Labels},
    author = {Gopavaram, Shakthi and Dev, Jayati and Camp, L Jean},
    year = {2022},
    keywords = {labels, privacy} }

Conference publications (15)
  1. Dalyapraz Manatova, Dewesha Sharma, Sagar Samtani, and L. Jean Camp. Building and Testing a Network of Social Trust in an Underground Forum: Robust Connections and Overlapping Criminal Domains. In 2022 APWG Symposium on Electronic Crime Research (eCrime), pages 1--12, November 2022.
    Note: ISSN: 2159-1245.
    Keywords: crime, Ecosystems, Entrepreneurship, Federated learning, Keyboards, Knowledge engineering, network resilience, Online banking, social network, Social networking (online), underground forums.
    @InProceedings{ manatova_building_2022,
    title = {Building and {Testing} a {Network} of {Social} {Trust} in an {Underground} {Forum}: {Robust} {Connections} and {Overlapping} {Criminal} {Domains}},
    copyright = {All rights reserved},
    shorttitle = {Building and {Testing} a {Network} of {Social} {Trust} in an {Underground} {Forum}},
    doi = {10.1109/eCrime57793.2022.10142120},
    abstract = {Underground markets support e-crime by providing a place where merchants and buyers trade assets for a price utilizing various digital currencies, payment providers, and wallets. The anonymity of these marketplaces and incentives to avoid penalties for criminal activity create significant challenges in studying trust in these ecosystems. Underground forums are clearinghouses where deals can be arranged, and services can be identified as vendors and customers engage. Such forums may be open and do not clear transactions, nonetheless still offer opportunities for entry, entrepreneurship, and customer or product discovery, serving as critical intermediaries for the marketplaces and enabling new entrants to establish trust and actors in one market to reach out to another.The empirical evaluation of interactions in such forums illuminates how collaborative networks form, interact, socialize, and exchange knowledge. To contribute to understanding online crime, we offer an empirical analysis of an underground forum. Specifically, we examine interactions in the social network as a whole and those components of the network that support three major types of crime: traditional crimes that occur away from keyboards, transitional crimes that have both offline and online instantiations, and entirely online new crimes. We compare and contrast the network structure of these three types and document the interactions between their social networks. The results suggest that although communities follow the small world effect, identifying and removing highly connected moderators or prolific contributors will not harm any of these three communities or the network, unless a significant portion of the network is removed. By further observing the structural patterns, we find that transitional crime actors tend to cluster more compared to the other two crimes while having the highest density.},
    booktitle = {2022 {APWG} {Symposium} on {Electronic} {Crime} {Research} ({eCrime})},
    author = {Manatova, Dalyapraz and Sharma, Dewesha and Samtani, Sagar and Camp, L. Jean},
    month = nov,
    year = {2022},
    note = {ISSN: 2159-1245},
    keywords = {crime, Ecosystems, Entrepreneurship, Federated learning, Keyboards, Knowledge engineering, network resilience, Online banking, social network, Social networking (online), underground forums},
    pages = {1--12} }

  2. Dalyapraz Manatova, Inna Kouper, and Sagar Samtani. Designing a Vulnerability Management Dashboard to Enhance Security Analysts’ Decision Making Processes. In Practice and Experience in Advanced Research Computing, PEARC '22, New York, NY, USA, pages 1--4, July 2022. Association for Computing Machinery.
    Keywords: network security visualizations, security visualizations, Vulnerability management.
    Abstract: Network vulnerability management reduces threats posed by weaknesses in software, hardware, or organizational practices. As networks and related threats grow in size and complexity, security analysts face the challenges of analyzing large amounts of data and prioritizing and communicating threats quickly and efficiently. In this paper, we report our work-in-progress of developing a vulnerability management dashboard that helps analysts overcome these challenges. The approach uses interviews to identify a typical security analyst workflow and proceeds with an iterative design that relies on real-world data. The vulnerability dashboard development was based on a common security analyst workflow and includes functions to allow vulnerability prioritization according to their age, persistence, and impact on the system. Future work will look to execute full-scale user studies to evaluate the dashboard’s functionality and decision-making utility.

    @InProceedings{ manatova_designing_2022,
    address = {New York, NY, USA},
    series = {{PEARC} '22},
    title = {Designing a {Vulnerability} {Management} {Dashboard} to {Enhance} {Security} {Analysts}’ {Decision} {Making} {Processes}},
    copyright = {All rights reserved},
    isbn = {978-1-4503-9161-0},
    url = {https://dl.acm.org/doi/10.1145/3491418.3535176},
    doi = {10.1145/3491418.3535176},
    abstract = {Network vulnerability management reduces threats posed by weaknesses in software, hardware, or organizational practices. As networks and related threats grow in size and complexity, security analysts face the challenges of analyzing large amounts of data and prioritizing and communicating threats quickly and efficiently. In this paper, we report our work-in-progress of developing a vulnerability management dashboard that helps analysts overcome these challenges. The approach uses interviews to identify a typical security analyst workflow and proceeds with an iterative design that relies on real-world data. The vulnerability dashboard development was based on a common security analyst workflow and includes functions to allow vulnerability prioritization according to their age, persistence, and impact on the system. Future work will look to execute full-scale user studies to evaluate the dashboard’s functionality and decision-making utility.},
    urldate = {2023-07-31},
    booktitle = {Practice and {Experience} in {Advanced} {Research} {Computing}},
    publisher = {Association for Computing Machinery},
    author = {Manatova, Dalyapraz and Kouper, Inna and Samtani, Sagar},
    month = jul,
    year = {2022},
    keywords = {network security visualizations, security visualizations, Vulnerability management},
    pages = {1--4} }

  3. Laura Schneider, Pnina Fichman, and Ece Gumusel. Online Disinhibition in Global Imagined Communities During COVID-19 Lockdown. In , May 2022.
    Keywords: COVID-19, Lockdown, Facebook groups, Social media, Online disinhibition, Imagined Communities.
    @InProceedings{ schneidercovid2022,
    title = {Online Disinhibition in Global Imagined Communities During COVID-19 Lockdown},
    author = {Schneider, Laura and Fichman, Pnina and Gumusel, Ece},
    howpublished = {ECSM, 9th European Conference on Social Media Proceedings},
    month = {May},
    year = {2022},
    keywords = "COVID-19, Lockdown, Facebook groups, Social media, Online disinhibition, Imagined Communities" }

  4. Ece Gumusel. Preliminary Analysis of Data Subject Right Effectiveness and Blockages in Industry. In , March 2022.
    Keywords: privacy, information policy, information ethics.
    @InProceedings{ gumusel2022databroker,
    title = {Preliminary Analysis of Data Subject Right Effectiveness and Blockages in Industry},
    author = {Gumusel, Ece},
    howpublished = {Poster at iConference 2022 Proceedings},
    url = {https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3991237},
    month = {March},
    year = {2022},
    keywords = "privacy, information policy, information ethics" }

  5. Jacob Abbott, Jayati Dev, Donginn Kim, Shakthidhar Gopavaram, Meera Iyer, Shivani Sadam, Shrirang Mare, Tatiana Ringenberg, Vafa Andalibi, and L. Jean Camp. Privacy Lessons Learnt from Deploying an IoT Ecosystem in the Home. In Proceedings of the 2022 European Symposium on Usable Security, EuroUSEC '22, New York, NY, USA, pages 98–110, 2022. Association for Computing Machinery.
    Keywords: Security, user interviews, smart home, IoT, 2FA, privacy.
    @InProceedings{ abbott2022privacy,
    author = {Abbott, Jacob and Dev, Jayati and Kim, Donginn and Gopavaram, Shakthidhar and Iyer, Meera and Sadam, Shivani and Mare, Shrirang and Ringenberg, Tatiana and Andalibi, Vafa and Camp, L. Jean},
    title = {Privacy Lessons Learnt from Deploying an IoT Ecosystem in the Home},
    year = {2022},
    isbn = {9781450397001},
    publisher = {Association for Computing Machinery},
    address = {New York, NY, USA},
    url = {https://doi-org.proxyiub.uits.iu.edu/10.1145/3549015.3554205},
    doi = {10.1145/3549015.3554205},
    abstract = {Studies of privacy perception in the Internet of Things (IoT) include in-laboratory evaluations as well as investigations of purchase decisions, deployment, and long-term use. In this study, we implemented identical IoT configurations in eight households to evaluate the installation and privacy concerns in the early adoption of IoT devices in our participants’ homes. The specific contributions of this work are insights into privacy perceptions of and challenges to the adoption of networked smart home devices and privacy management of IoT devices. The focus in this work was on participants’ privacy concerns about devices deployed in an IoT ecosystem influencing their gradual change of use. We detail how we use a three-week longitudinal interview protocol to compare user perceptions of privacy risk. We assessed users’ comfort with devices, perceived benefits, and data sensitivity. We discuss the factors identified by participants as relevant to their personal security and privacy management of in-home devices. We close with recommendations for privacy preserving smart home devices grounded in our participants’ experiences.},
    booktitle = {Proceedings of the 2022 European Symposium on Usable Security},
    pages = {98–110},
    numpages = {13},
    keywords = {Security, user interviews, smart home, IoT, 2FA, privacy},
    location = {Karlsruhe, Germany},
    series = {EuroUSEC '22} }

  6. Jacob Abbott, Jofish Kaye, and James Clawson. Identifying an Aurally Distinct Phrase Set for Text Entry Techniques. In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems, CHI '22, New York, NY, USA, 2022. Association for Computing Machinery.
    Keywords: text-to-speech, accessibility, text entry, TTS, synthesized speech, input techniques.
    Abstract: In the last decade, interest in accessible and eyes-free text entry has continued to grow. However, little research has been done to explore the feasibility of using audibly distinct phrases for text entry tasks. To better understand whether preexisting phrases used in text entry research are sufficiently distinct for eyes-free text entry tasks, we used Microsoft’s and Apple’s desktop text-to-speech systems to generate all 500 phrases from MacKenzie and Soukoreff’s set [32] using the default male and female voices. We then asked 392 participants recruited through Amazon’s Mechanical Turk to transcribe the generated audio clips. We report participant transcription errors and present the 96 phrases that were observed with no comprehension errors. These phrases were further tested with 80 participants who identified as low-vision and/or blind recruited through Twitter. We contribute the 92 phrases that were observed to maintain no comprehension errors across both experiments.

    @InProceedings{ abbott2022identifying,
    author = {Abbott, Jacob and Kaye, Jofish and Clawson, James},
    title = {Identifying an Aurally Distinct Phrase Set for Text Entry Techniques},
    year = {2022},
    isbn = {9781450391573},
    publisher = {Association for Computing Machinery},
    address = {New York, NY, USA},
    url = {https://doi.org/10.1145/3491102.3501897},
    doi = {10.1145/3491102.3501897},
    abstract = {In the last decade, interest in accessible and eyes-free text entry has continued to grow. However, little research has been done to explore the feasibility of using audibly distinct phrases for text entry tasks. To better understand whether preexisting phrases used in text entry research are sufficiently distinct for eyes-free text entry tasks, we used Microsoft’s and Apple’s desktop text-to-speech systems to generate all 500 phrases from MacKenzie and Soukoreff’s set [32] using the default male and female voices. We then asked 392 participants recruited through Amazon’s Mechanical Turk to transcribe the generated audio clips. We report participant transcription errors and present the 96 phrases that were observed with no comprehension errors. These phrases were further tested with 80 participants who identified as low-vision and/or blind recruited through Twitter. We contribute the 92 phrases that were observed to maintain no comprehension errors across both experiments.},
    booktitle = {Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems},
    articleno = {467},
    numpages = {13},
    keywords = {text-to-speech, accessibility, text entry, TTS, synthesized speech, input techniques},
    location = {New Orleans, LA, USA},
    series = {CHI '22} }

  7. Vafa Andalibi, Eliot Lear, DongInn Kim, and L Jean Camp. On the analysis of MUD-files’ interactions, conflicts, and configuration requirements before deployment. In The Fifth International Conference on Safety and Security with IoT: SaSeIoT 2021, pages 137--157, 2022. Springer International Publishing.
    Keywords: MUD.
    @InProceedings{ andalibi2022analysis,
    title = {On the analysis of MUD-files’ interactions, conflicts, and configuration requirements before deployment},
    author = {Andalibi, Vafa and Lear, Eliot and Kim, DongInn and Camp, L Jean},
    booktitle = {The Fifth International Conference on Safety and Security with IoT: SaSeIoT 2021},
    pages = {137--157},
    year = {2022},
    organization = {Springer International Publishing},
    keywords = {MUD} }

  8. Vafa Andalibi, Erfan Sadeqi Azer, and L Jean Camp. Criteria and Analysis for Human-Centered Browser Fingerprinting Countermeasures. In Proceedings of the 55th Hawaii International Conference on System Sciences, 2022.
    Keywords: phishing, user studies, global resilience.
    @InProceedings{ andalibi2022criteria,
    title = {Criteria and Analysis for Human-Centered Browser Fingerprinting Countermeasures},
    author = {Andalibi, Vafa and Sadeqi Azer, Erfan and Camp, L Jean},
    booktitle = {Proceedings of the 55th Hawaii International Conference on System Sciences},
    year = {2022},
    keywords = {phishing, user studies, global resilience} }

  9. Peter J Caven, Shakthidhar Reddy Gopavaram, and L Jean Camp. Integrating Human Intelligence to Bypass Information Asymmetry in Procurement Decision-Making. In MILCOM 2022-2022 IEEE Military Communications Conference (MILCOM), pages 687--692, 2022. IEEE.
    Keywords: SBOM, user studies, behaviorial economics.
    @InProceedings{ caven2022integrating,
    title = {Integrating Human Intelligence to Bypass Information Asymmetry in Procurement Decision-Making},
    author = {Caven, Peter J and Gopavaram, Shakthidhar Reddy and Camp, L Jean},
    booktitle = {MILCOM 2022-2022 IEEE Military Communications Conference (MILCOM)},
    pages = {687--692},
    year = {2022},
    organization = {IEEE},
    keywords = {SBOM, user studies, behaviorial economics} }

  10. Peter Caven, Shakthi Gopavaram, and L. Jean Camp. Integrating Human Intelligence to Bypass Information Asymmetry In Procurement Decision Making. In MILCOM, 2022.
    Keywords: Labels, SBOM.
    @InProceedings{ covensok22,
    title = {Integrating Human Intelligence to Bypass Information Asymmetry In Procurement Decision Making},
    author = {Caven, Peter and Gopavaram, Shakthi and Camp, L. Jean},
    booktitle = {MILCOM},
    location = {Rockville, MD},
    year = {2022},
    keywords = {Labels, SBOM} }

  11. Ece Gumusel, Vincent Q Malic, Devan Ray Donaldson, Kevin Ashley, and Xiaozhong Liu. An Annotation Schema for the Detection of Social Bias in Legal Text Corpora. In In iConference 2022 Proceedings, 2022.
    Keywords: Artificial intelligence, Information ethics, Machine learning, Natural language processing.
    @InProceedings{ gumusel2022legal,
    title = { An Annotation Schema for the Detection of Social Bias in Legal Text Corpora},
    author = {Gumusel, Ece and Malic, Vincent Q and Donaldson, Devan Ray and Ashley, Kevin and Liu, Xiaozhong},
    booktitle = {In iConference 2022 Proceedings},
    year = {2022},
    keywords = "Artificial intelligence, Information ethics, Machine learning, Natural language processing" }

  12. Xinyao Ma, Zaiqiao Ye, and Sameer Patil. Do Regional Variations Affect the CAPTCHA User Experience? A Comparison of CAPTCHAs in China and the United States. In Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, pages 1--9, 2022.
    @InProceedings{ ma2022regional,
    title = {Do Regional Variations Affect the CAPTCHA User Experience? A Comparison of CAPTCHAs in China and the United States},
    author = {Ma, Xinyao and Ye, Zaiqiao and Patil, Sameer},
    booktitle = {Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering},
    pages = {1--9},
    year = {2022} }

  13. Dalyapraz Manatova, Dewesha Sharma, Sagar Samtani, and L Jean Camp. Building and Testing a Network of Social Trust in an Underground Forum: Robust Connections and Overlapping Criminal Domains. In 2022 APWG Symposium on Electronic Crime Research (eCrime), pages 1--12, 2022. IEEE.
    Keywords: ecrime, global resilience.
    @InProceedings{ manatova2022building,
    title = {Building and Testing a Network of Social Trust in an Underground Forum: Robust Connections and Overlapping Criminal Domains},
    author = {Manatova, Dalyapraz and Sharma, Dewesha and Samtani, Sagar and Camp, L Jean},
    booktitle = {2022 APWG Symposium on Electronic Crime Research (eCrime)},
    pages = {1--12},
    year = {2022},
    organization = {IEEE},
    keywords = {ecrime, global resilience} }

  14. Joshua Streiff, Naheem Noah, and Sanchari Das. A Call for a New Privacy and Security Regime for IoT Smart Toys. In IEEE Conference on Dependable and Secure Computing (IEEE DSC 2022), 2022. IEEE.
    Keywords: IoT.
    @InProceedings{ streiff2022_ieee_dsc,
    title = {A Call for a New Privacy and Security Regime for IoT Smart Toys},
    author = {Streiff, Joshua and Noah, Naheem and Das, Sanchari},
    booktitle = {IEEE Conference on Dependable and Secure Computing (IEEE DSC 2022)},
    year = {2022},
    keywords = {IoT},
    organization = {IEEE} }

  15. Zitao Zhang, Jacob Abbott, Sanchari Das, and L. Jean Camp. Building an Authentication Infrastructure — Designing a Two Factor Authentication Hardware Token with Form Factor that Encourages Engagement. In TPRC 2022: The 50th Research Conference on Communication, Information and Internet Policy, 2022. Social Science Research Network.
    Keywords: Security, UX, 2FA.
    @InProceedings{ zhang2022building,
    author = {Zhang, Zitao and Abbott, Jacob and Das, Sanchari and Camp, L. Jean},
    title = {Building an Authentication Infrastructure — Designing a Two Factor Authentication Hardware Token with Form Factor that Encourages Engagement},
    year = {2022},
    publisher = {Social Science Research Network},
    url = {https://ssrn.com/abstract=4177411},
    keywords = {Security, UX, 2FA},
    booktitle = {TPRC 2022: The 50th Research Conference on Communication, Information and Internet Policy} }

Posters and Presentations (1)
  1. Joshua Streiff, Tatiana Ringenberg, Jayati Dev, and L.Jean Camp. Everyone’s Flag: Using Entry Level Capture the Flag to Engage Low SES Student Groups. ECGBL, October 2022.
    Keywords: IoT.
    @Misc{ streiff2022_ecgbl_poster,
    title = "Everyone’s Flag: Using Entry Level Capture the Flag to Engage Low SES Student Groups",
    author = {Streiff, Joshua and Ringenberg, Tatiana, and Dev, Jayati, and Camp, L.Jean},
    howpublished = {ECGBL},
    month = {October},
    year = {2022},
    keywords = {IoT} }


BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.




Last modified: Mon Aug 19 14:38:55 2024
Author: teamhats.


This document was translated from BibTEX by bibtex2html and is customized by IU IoT House