L. Jean Camp
#47,235
Most Influential Person Now
American Informatics researcher, academic
L. Jean Camp's AcademicInfluence.com Rankings
L. Jean Campcomputer-science Degrees
Computer Science
#2916
World Rank
#3053
Historical Rank
Human Computer Interaction
#4
World Rank
#4
Historical Rank
Informatics
#19
World Rank
#20
Historical Rank
Operating Systems
#19
World Rank
#20
Historical Rank
Download Badge
Computer Science
L. Jean Camp's Degrees
- PhD Computer Science Carnegie Mellon University
- Masters Computer Science Carnegie Mellon University
- Bachelors Mathematics Smith College
Similar Degrees You Can Earn
Why Is L. Jean Camp Influential?
(Suggest an Edit or Addition)According to Wikipedia, Linda Jean Camp is an American computer scientist whose research concerns information security, with a focus on human-centered design, autonomy, and safety. She has also made important contributions to risk communication, internet governance, and the economics of security. She is a professor of informatics in the Luddy School of Informatics, Computing, and Engineering at Indiana University Bloomington, where she directs the Center for Security and Privacy in Informatics, Computing, and Engineering.
L. Jean Camp's Published Works
Published Works
- OpenFlow vulnerability assessment (2013) (263)
- Mental models of privacy and security (2009) (163)
- Trust and Risk in Internet Commerce (2000) (127)
- Privacy, Technology, and Aging: A Proposed Framework (2011) (124)
- Mental Models of Security Risks (2007) (114)
- Pricing Security (2000) (89)
- Security and privacy in online social networking: Risk perceptions and precautionary behaviour (2018) (84)
- Why Johnny Doesn't Use Two Factor A Two-Phase Usability Study of the FIDO U2F Security Key (2018) (83)
- Designing for Trust (2002) (72)
- Game-theoretic modeling and analysis of insider threats (2008) (64)
- Mental Models of Computer Security Risks (2007) (62)
- Anonymous Atomic Transactions (1996) (60)
- Proof of Work can Work (2006) (58)
- End User Perception of Online Risk under Uncertainty (2012) (57)
- How In-Home Technologies Mediate Caregiving Relationships in Later Life (2013) (56)
- Token and Notational Money in Electronic Commerce (1995) (54)
- Studying the effectiveness of android application permissions requests (2013) (54)
- Web Security and Privacy: An American Perspective (1999) (48)
- Influence of Privacy Attitude and Privacy Cue Framing on Android App Choices (2016) (47)
- Beyond the lock icon: real-time detection of phishing websites using public key certificates (2015) (47)
- DigiSwitch: A Device to Allow Older Adults to Monitor and Direct the Collection and Transmission of Health Information Collected at Home (2011) (42)
- Factors in an end user security expertise instrument (2017) (41)
- Targeted risk communication for computer security (2011) (41)
- Design for Trust (2004) (40)
- The code of elections (2004) (39)
- First Principles of Copyright for DRM Design (2003) (39)
- Implementing Mental Models (2012) (38)
- Risk Communication Design: Video vs. Text (2012) (38)
- Guided-wave and free-space optical interconnects for parallel-processing systems: a comparison. (1994) (38)
- Mitigating Inadvertent Insider Threats with Incentives (2009) (34)
- DigiSwitch: design and evaluation of a device for older adults to preserve privacy while monitoring health at home (2010) (32)
- Aging, Privacy, and Home-Based Computing: Developing a Design Framework (2012) (32)
- DRM: doesn't really mean digital copyright management (2002) (32)
- Evaluating User Perception of Multi-Factor Authentication: A Systematic Review (2019) (32)
- A qualitative study on usability and acceptability of Yubico security key (2018) (31)
- Reliable, Usable Signaling to Defeat Masquerade Attacks (2006) (31)
- Trust: A Collision of Paradigms (2000) (31)
- Digital identity (2004) (29)
- The internet as public space: concepts, issues, and implications in public policy (2000) (29)
- Critical issues in Internet commerce (1997) (29)
- Detection of Rogue Certificates from Trusted Certificate Authorities Using Deep Neural Networks (2016) (28)
- Heuristics and Biases: Implications for Security Design (2013) (26)
- Beyond Consent: Privacy in Ubiquitous Computing (Ubicomp) (2007) (26)
- Comparative eye tracking of experts and novices in web single sign-on (2013) (26)
- Diffusion and Adoption of IPv6 in the Arin Region (2008) (24)
- Threat analysis of online health information system (2010) (23)
- Reconceptualizing the Role of Security User (2011) (22)
- Risk communication design for older adults (2012) (22)
- Privacy concerns in assisted living technologies (2014) (22)
- Why Johnny Can't Blow the Whistle: Identifying and Reducing Usability Issues in Anonymity Systems (2014) (20)
- The portal monitor: a privacy-enhanced event-driven system for elder care (2009) (19)
- Peer-produced privacy protection (2013) (19)
- Lilith: Scalable execution of user code for distributed computing (1997) (18)
- Analysis of eCrime in Crowd-sourced Labor Markets: Mechanical Turk vs. Freelancer (2012) (17)
- Identity in Digital Government (2004) (16)
- Eliminating Stop-Points in the Installation and Use of Anonymity Systems : a Usability Evaluation of the Tor Browser Bundle (2012) (16)
- Risk Communication in Security Using Mental Models (2007) (15)
- MFA is a Waste of Time! Understanding Negative Connotation Towards MFA Applications via User Generated Content (2019) (15)
- Pricing Security - A Market in Vulnerabilities (2004) (14)
- User-Centered Risk Communication for Safer Browsing (2020) (14)
- Insider Threat Event Detection in User-System Interactions (2017) (14)
- Poster Abstract: Who's Watching Your Child? Exploring Home Security Risks with Smart Toy Bears (2018) (13)
- The State of Economics of Information Security (2006) (13)
- Designing Risk Communication for Older Adults ∗ (2011) (13)
- MFA is A Necessary Chore!: Exploring User Mental Models of Multi-Factor Authentication Technologies (2020) (13)
- Pools, clubs and security: designing for a party not a person (2012) (12)
- A Privacy-Aware Architecture for Sharing Web Histories (2007) (12)
- Universal Service in a Ubiquitous Digital Network (2001) (11)
- Cross-country analysis of spambots (2013) (11)
- The Economics of Financial and Medical Identity Theft (2012) (11)
- Law enforcement surveillance in the network society (2002) (11)
- Cars, Condoms, and Facebook (2013) (11)
- Personalized WhatsApp Privacy: Demographic and Cultural Influences on Indian and Saudi Users (2019) (10)
- The smuggling theory approach to organized digital crime (2011) (10)
- A Complete Study of P.K.I. (PKI’s Known Incidents) (2019) (10)
- Throwing MUD into the FOG: Defending IoT and Fog by expanding MUD to Fog network (2019) (10)
- Collaborating with the Enemy on Network Management (2014) (10)
- Protecting the Internet from Dictators: Technical and Policy Solutions to Ensure Online Freedoms (2012) (10)
- Varieties of Software and their Implications for Effective Democratic Government (2006) (10)
- Security and Morality: A Tale of User Deceit (2006) (10)
- Best Practices Would Make Things Better in the IoT (2020) (10)
- Privacy Practices, Preferences, and Compunctions: WhatsApp Users in India (2018) (10)
- Economics of Identity Theft - Avoidance, Causes and Possible Cures (2010) (10)
- Identity Management's Misaligned Incentives (2010) (9)
- A privacy-aware architecture for a Web rating system (2009) (9)
- Quantifying Susceptibility to Spear Phishing in a High School Environment Using Signal Detection Theory (2020) (9)
- Setting Standards: Looking to the Internet for Models of Governance (2004) (9)
- Ex Ante vs. Ex Post: Economically Efficient Sanctioning Regimes for Online Risks (2013) (9)
- CPasswords: Leveraging Episodic Memory and Human-Centered Design for Better Authentication (2016) (8)
- Macroeconomic Analysis of Malware (2013) (8)
- Using bursty announcements for detecting BGP routing anomalies (2021) (8)
- Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections (2012) (8)
- Non-Inclusive Online Security: Older Adults' Experience with Two-Factor Authentication (2020) (8)
- Firewalling Scenic Routes: Preventing Data Exfiltration via Political and Geographic Routing Policies (2016) (7)
- Risk Characteristics, Mental Models, and Perception of Security Risks (2015) (7)
- Measuring Human Resilience in the Face of the Global Epidemiology of Cyber Attacks (2019) (7)
- Mental Models of Computer Security (2004) (7)
- Power and Security in the Information Age (2009) (7)
- Evaluating user susceptibility to phishing attacks (2022) (7)
- Using Budget-Based Access Control to Manage Operational Risks Caused by Insiders (2010) (7)
- Deregulating the local loop: the telecommunications regulation path less chosen as taken by Bangladesh (2001) (7)
- PeerSec: Towards Peer Production and Crowdsourcing for Enhanced Security (2012) (7)
- Lessons Learnt from Comparing WhatsApp Privacy Concerns Across Saudi and Indian Populations (2020) (6)
- NetTrust - Recommendation System for Embedding Trust in a Virtual Realm (2007) (6)
- The evolution of US telecommunications infrastructure (2000) (6)
- Identity, authentication, and identifiers in digital government (2003) (6)
- A Life or Death InfoSec Subversion (2008) (6)
- Factors Influencing Password Reuse: A Case Study (2018) (6)
- User Engagement with Chatbots: A Discursive Psychology Approach (2020) (6)
- The Governance of Code: Open Land vs. UCITA Land (2002) (6)
- On the Analysis of MUD-Files' Interactions, Conflicts, and Configuration Requirements Before Deployment (2021) (6)
- Why cybercrime? (2015) (6)
- Respecting people and respecting privacy (2015) (6)
- IoT Marketplace: Willingness-To-Pay vs. Willingness-To-Accept (2021) (6)
- Helping You Protect You (2014) (5)
- The decreasing marginal value of evaluation network size (2011) (5)
- What Can Johnny Do?–Factors in an End-User Expertise Instrument (2016) (5)
- Incompetents, criminals, or spies: Macroeconomic analysis of routing anomalies (2017) (5)
- Providing Auditing While Protecting Privacy (1994) (5)
- A Risk Based Approach to Limit the Effects of Covert Channels for Internet Sensor Data Aggregators for Sensor Privacy (2009) (5)
- An Atomicity-Generating Protocol for Anonymous Currencies (2001) (5)
- Self-identified experts lost on the interwebs: the importance of treating all results as learning experiences (2012) (5)
- Smart Storytelling: Video and Text Risk Communication to Increase MFA Acceptability (2020) (5)
- Security Mandates are Pervasive: An Inter-School Study on Analyzing User Authentication Behavior (2019) (5)
- Bayesian Evaluation of User App Choices in the Presence of Risk Communication on Android Devices (2020) (4)
- Poster Abstract: Good Advice That Just Doesn't Help (2018) (4)
- Making IoT Worthy of Human Trust (2019) (4)
- Privacy Tradeoffs: Myth or Reality? Panel (2002) (4)
- Proceedings of the first ACM workshop on Security and privacy in medical and home-care systems (2009) (4)
- Understanding privacy concerns of whatsapp users in India: poster (2018) (4)
- Beyond Risk-Based Access Control: Towards Incentive-Based Access Control (2011) (4)
- Economics of Identity Theft (2007) (4)
- Security Risk Management Using Incentives (2011) (4)
- Privacy & reliability in internet commerce (1996) (4)
- Bongo: A BGP speaker built for defending against bad routes (2016) (4)
- Filtering IP source spoofing using feasible path reverse path forwarding with SDN (2015) (4)
- Voting, vote capture & vote counting symposium (2005) (3)
- Limits To Certainty in QoS Pricing and Bandwidth (2001) (3)
- Conceptualizing human resilience in the face of the global epidemiology of cyber attacks (2019) (3)
- Virtual Economies: Threats and Risks (2007) (3)
- Gandhigiri in cyberspace: a novel approach to information ethics (2012) (3)
- Peer-to-Peer Systems (2004) (3)
- Diffusion and Adoption of IPv6 in the United States (2008) (3)
- Phishing in Smooth Waters: The State of Banking Certificates in the US (2014) (3)
- Examining the Jurisdictions of Internet Routes to Prevent Data Exfiltration (2016) (3)
- Systematic Design for Privacy in Ubicomp (2006) (3)
- Full paper: Risk communication design for older adults (2012) (3)
- Privacy Implications of Aware, Active, and Adaptive Technologies (2016) (3)
- Design for Trust in Ambient and Ubiquitous Computing (2009) (3)
- Design for Privacy : Towards a Methodological Approach to Trustworthy Ubicomp Design (2005) (2)
- The Impact of Privacy Regulation on Technology Adoption : The Case of Health Information Exchanges (2013) (2)
- Risking it All: Unlocking the Backdoor to the Nation's Cybersecurity (2014) (2)
- Trust and Trustworthy Computing (2012) (2)
- User-Driven Design in Smart Homes: Ethical Aspects (2014) (2)
- Self-identified experts lost on the interwebs (2012) (2)
- Stopping the Insider at the Gates: Protecting Organizational Assets through Graph Mining (2018) (2)
- Can You Hear Me Now? Audio and Visual Interactions That Change App Choices (2020) (2)
- Human Implications of Technology (2004) (2)
- Pinning & Binning: Real Time Classification of Certificates (2013) (2)
- Access Denied (2003) (2)
- Building An Authentication Infrastructure — Designing a Two Factor Authentication Hardware Token with Form Factor that Encourages Engagement (2022) (2)
- Making Access Control Easy in IoT (2021) (2)
- Using Bursty Announcements for Early Detection of BGP Routing Anomalies (2019) (2)
- Privacy in Crisis: Participants' Privacy Preferences for Health and Marketing Data during a Pandemic (2020) (2)
- A holistic analysis of web-based public key infrastructure failures: comparing experts' perceptions and real-world incidents (2021) (2)
- Privacy Preserving Policy Model Framework (2019) (2)
- Improving anonymity networks via end-to-end design (2011) (1)
- American Privacy Perceptions in the COVID Pandemic (2021) (1)
- Towards Coherent Regulation of Law Enforcement Surveillance in the Network Society (2002) (1)
- Identity the Civic Scenario (2004) (1)
- Code, coding and coded perspectives (2003) (1)
- Fingerprinting Edge and Cloud Services in IoT (2020) (1)
- Policy Proposal: Limit The Address Allocation to Extend The Lifetime of IPv4 (2009) (1)
- Protecting IoT Devices through Localized Detection of BGP Hijacks for Individual Things (2021) (1)
- Ethical design for security and privacy (2011) (1)
- Is Visualization Enough? Evaluating the Efficacy of MUD-Visualizer in Enabling Ease of Deployment for Manufacturer Usage Description (MUD) (2021) (1)
- PEER PATCHING - RAPID RESPONSE IN DISTRIBUTED SYSTEMS (2004) (1)
- Gandhigiri in the Infosphere : A Novel Approach to Information Ethics (2012) (1)
- Bayesian evaluation of privacy-preserving risk communication for user android app preferences (2021) (1)
- Thailand at the crossroads (2004) (1)
- Panel: Humans and Technology for Inclusive Privacy and Security (2021) (1)
- WHY DON’T ELDERS ADOPT TWO-FACTOR AUTHENTICATION? BECAUSE THEY ARE EXCLUDED BY DESIGN (2019) (1)
- Bedrooms , Barrooms & Boardrooms on the Internet (2003) (1)
- Cross-country analysis of spambots (2013) (1)
- SBoM Vulnerability Assessment & Corresponding Requirements (2021) (1)
- Privacy: from abstraction to applications (1994) (1)
- Security and Usability [Guest Editor's Introduction] (2007) (1)
- Spare the rod, spoil the network security? Economic analysis of sanctions online (2015) (1)
- Policy proposal: limit address allocation to extend the lifetime of IPv4 in the APNIC region (2010) (1)
- An Atomicity-Generating Layer for Anonymous Currencies (2002) (1)
- DRAFT DRAFT Peer Production of Privacy and Security Information (2013) (1)
- Open code for digital government (2003) (1)
- Defeating the Greatest Masquerade (2012) (1)
- Making Security Manifest Security and Autonomy for End Users (2003) (1)
- Going Beyond Labels (2021) (1)
- Code as Embedded Speech, Machine, and Service (2001) (1)
- A Proposal for Assisted Private Information Retrieval (2022) (1)
- Healthcare Data: Protections and Hemorrhages (2012) (0)
- Finding the older user in home-based computing studies (2012) (0)
- Critical issues in Internet commerce : The global Internet : Part 1 (1997) (0)
- Identity in Economics, and in Context (2012) (0)
- Technologies of Identity (2012) (0)
- Computer security and, versus, or security informatics: keynote address (2011) (0)
- Aging, Privacy, and Home-Based Computing: Development of a Framework for Design (2017) (0)
- Good Neighbors Can Make Good Fences : A Peer-to-peer User Security System (2005) (0)
- Using ML to Block BGP Hijacking (2019) (0)
- Identity Theft in Healthcare (2012) (0)
- Kids, Cats, and Control: Designing Privacy and Security Dashboards for IoT Home Devices (2023) (0)
- Cryptography policy needs another look (1994) (0)
- Organizational Security: Implementing a Risk-Reduction-Based Incentivization Model for MFA Adoption (2021) (0)
- Peer-produced Privacy Protection: A Common-pools Approach (2013) (0)
- Panel Report: Open Code for Digital Government (2003) (0)
- Proceedings of the 5th international conference on Trust and Trustworthy Computing (2012) (0)
- Human and Organizational Factors in Public Key Certificate Authority Failures (2021) (0)
- Who Owns You (2007) (0)
- Privacy Lessons Learnt from Deploying an IoT Ecosystem in the Home (2022) (0)
- Privacy Tradeoffs: Myth or Reality? (Panel Summary) (2003) (0)
- Coalition Letter to President Obama Urging Support for Encryption (2015) (0)
- Perceptions of Computing Risks (2013) (0)
- Privacy concerns in assisted living technologies (2013) (0)
- Criteria and Analysis for Human-Centered Browser Fingerprinting Countermeasures (2022) (0)
- An Argument and Worked Example: Private DNS as a Human Right (2021) (0)
- Survivability & Trust (2001) (0)
- Attitudes Towards Sharing Information on Facebook Measure (2018) (0)
- Student paper competition (abstract only) (2000) (0)
- Security and Privacy as Market Failures (2012) (0)
- Editorial: Human-Centric Security and Privacy (2022) (0)
- Incentives, behavior, and risk management (2011) (0)
- Managing the last eights: three ways forward for IPv6 (2010) (0)
- Filtering Source-Spoofed IP Traffic Using Feasible Path Reverse Path Forwarding with SDN (2016) (0)
- Modern Technological and Traditional Social Identities (2012) (0)
- Security and Privacy Interactions as Risk Communication (2015) (0)
- Design for Privacy : Towards a Methodological Approach to Trustworthy Design (2008) (0)
- Conducting an Ethical Study of Web Traffic (2012) (0)
- Secrecy, Privacy, Identity (2012) (0)
- A Review of Security and Human Behaviors (2008) (0)
- Integrating Human Intelligence to Bypass Information Asymmetry in Procurement Decision-Making (2022) (0)
- A Usability Study on the Net Trust Anti-Fraud Toolbar (2007) (0)
- Networking strategy at traveler's insurance (1993) (0)
- Identity the Civic Scenario (Workshop report) (2004) (0)
- Mental Models of PrivacySecurity (2009) (0)
- Law Surveillance Network (2002) (0)
- Financial cryptography and data security : FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012 : revised selected papers (2012) (0)
- Session details: Privacy (2009) (0)
- All Security Is Good(s): Design Guidance for Economics (2020) (0)
- The world in 2010: many new entrants (2000) (0)
- Privacy and Usability in COVID Enrollment Apps (2021) (0)
- NetTrust – Socio-Technical Solution to Phishing (2008) (0)
- Hardening the Network from the Friend Within (2009) (0)
- Lilith: A scalable secure tool for massively parallel distributed computing (1997) (0)
- Harm Mitigation from the Release of Personal Identity Information (2012) (0)
This paper list is powered by the following services:
Other Resources About L. Jean Camp
What Schools Are Affiliated With L. Jean Camp?
L. Jean Camp is affiliated with the following schools: