L. Jean Camp

Indiana University Bloomington - School of Informatics and Computing

Associate Professor

901 E 10th St

Bloomington, IN 47401

United States

SCHOLARLY PAPERS

38

DOWNLOADS
Rank 4,034

SSRN RANKINGS

Top 4,034

in Total Papers Downloads

9,993

SSRN CITATIONS
Rank 20,903

SSRN RANKINGS

Top 20,903

in Total Papers Citations

16

CROSSREF CITATIONS

22

Scholarly Papers (38)

1.

Mental Models of Privacy and Security

Number of pages: 13 Posted: 09 Aug 2006
L. Jean Camp
Indiana University Bloomington - School of Informatics and Computing
Downloads 1,140 (18,464)
Citation 3

Abstract:

Loading...

privacy, security, usability

2.

Trust: A Collision of Paradigms

KSG Working Paper No. 01-005
Number of pages: 12 Posted: 08 Mar 2001
Indiana University Bloomington - School of Informatics and Computing, Loyola Marymount University and Cornell Tech
Downloads 954 (23,991)
Citation 4

Abstract:

Loading...

information technology

3.

A Complete Study of P.K.I. (PKI’s Known Incidents)

Number of pages: 45 Posted: 25 Jul 2019 Last Revised: 26 Sep 2019
Nicolas Serrano, Hilda Hadan and L. Jean Camp
Indiana University - Bloomington, School of Informatics, Computing & Engineering, Indiana University Bloomington - School of Informatics, Computing & Engineering and Indiana University Bloomington - School of Informatics and Computing
Downloads 820 (29,774)
Citation 2

Abstract:

Loading...

PKI, Trust, Digital Certificate, Certificate Authority, Rogue Certificate, PKI Governance, IoT

4.

Economics of Information Security

Number of pages: 14 Posted: 21 Mar 2006
L. Jean Camp
Indiana University Bloomington - School of Informatics and Computing
Downloads 686 (37,988)
Citation 3

Abstract:

Loading...

economics, security, privacy, economics of security

5.

Privacy-Enhancing Technologies for Internet Commerce

KSG Working Paper No. RWP02-033
Number of pages: 16 Posted: 19 Sep 2002
L. Jean Camp and Carlos A. Osorio
Indiana University Bloomington - School of Informatics and Computing and Yuken Impact Research Lab
Downloads 669 (39,291)
Citation 1

Abstract:

Loading...

trust, security, privacy, e-commerce

6.

Pricing Security: Vulnerabilities as Externalities

Economics of Information Security, Vol. 12, 2004
Number of pages: 14 Posted: 05 Apr 2006
L. Jean Camp and Catherine D. Wolfram
Indiana University Bloomington - School of Informatics and Computing and University of California, Berkeley - Economic Analysis & Policy Group
Downloads 529 (53,440)

Abstract:

Loading...

trust, security, privacy, e-commerce

7.

Code as Governance, the Governance of Code

John F. Kennedy School of Government Faculty Research Working Paper Series 01-014
Number of pages: 31 Posted: 25 Feb 2002
L. Jean Camp and Serena Syme
Indiana University Bloomington - School of Informatics and Computing and Harvard University - Harvard Kennedy School (HKS)
Downloads 494 (58,277)

Abstract:

Loading...

Business and Government Policy, Information Technology

Re-Embedding Existing Social Networks into Online Experiences to Aid in Trust Assessment

Number of pages: 9 Posted: 26 Apr 2005
Alla Genkina and L. Jean Camp
Indiana University Bloomington and Indiana University Bloomington - School of Informatics and Computing
Downloads 478 (60,032)

Abstract:

Loading...

Trust, phishing, Internet, usability, social capital, reputation

Re-Embedding Existing Social Networks into Online Experiences to Aid in Trust Assessment

Posted: 04 Jul 2007
Alla Genkina and L. Jean Camp
Indiana University Bloomington and Indiana University Bloomington - School of Informatics and Computing

Abstract:

Loading...

Trust, phishing, Internet, usability, social capital, reputation

9.

Setting Standards: Looking to the Internet for Models of Governance

Number of pages: 22 Posted: 08 Dec 2004
L. Jean Camp and Charles Vincent
Indiana University Bloomington - School of Informatics and Computing and Harvard University - Harvard Kennedy School (HKS)
Downloads 441 (66,892)
Citation 3

Abstract:

Loading...

Design for values, governance, intellectual property, Internet, open code, privacy, security, standards, technology and society

10.

Drm: Doesn't Really Mean Digital Copyright Management

KSG Working Paper Series RWP02-034
Number of pages: 12 Posted: 07 Nov 2002
L. Jean Camp
Indiana University Bloomington - School of Informatics and Computing
Downloads 425 (70,019)
Citation 2

Abstract:

Loading...

Information Technology

11.

Design for Trust

TRUST, REPUTATION AND SECURITY: THEORIES AND PRACTICE, Rino Falcone, ed., Springer-Verlang (Berlin), 2003
Number of pages: 14 Posted: 08 Dec 2004
L. Jean Camp
Indiana University Bloomington - School of Informatics and Computing
Downloads 405 (74,229)

Abstract:

Loading...

Trust, privacy, consumer protection, security, information security

12.

The Privacy Paradox: A Facebook Case Study

2014 TPRC Conference Paper
Number of pages: 40 Posted: 21 Mar 2014 Last Revised: 06 Aug 2014
Vaibhav Garg, Kevin Benton and L. Jean Camp
Drexel University, Indiana University and Indiana University Bloomington - School of Informatics and Computing
Downloads 376 (80,779)
Citation 7

Abstract:

Loading...

Privacy, Usability, Economics, Risk Perception, Facebook, OSNs

13.

Factors Influencing Password Reuse: A Case Study

TPRC 46: The 46th Research Conference on Communication, Information and Internet Policy 2018
Number of pages: 9 Posted: 19 Mar 2018 Last Revised: 29 Jul 2019
Jacob Abbott, Daniel Calarco and L. Jean Camp
Indiana University Bloomington - School of Informatics, Computing, and Engineering, Independent and Indiana University Bloomington - School of Informatics and Computing
Downloads 275 (114,362)

Abstract:

Loading...

Passwords, Policies, Requirements, Reuse

14.

Universal Service in a Ubiquitous Digital Network

KSG Working Paper No. RWP01-006
Number of pages: 12 Posted: 23 Feb 2002
L. Jean Camp and Rose P. Tsang
Indiana University Bloomington - School of Informatics and Computing and Sandia National Laboratories
Downloads 272 (115,638)
Citation 1

Abstract:

Loading...

Business and Government Policy, Information Technology, Welfare/Health Care/Social Policy

15.

Identity in Digital Government

Number of pages: 4 Posted: 08 Nov 2004
L. Jean Camp
Indiana University Bloomington - School of Informatics and Computing
Downloads 252 (125,242)
Citation 4

Abstract:

Loading...

Privacy, security, cybersecurity

16.

Risking it All: Unlocking the Backdoor to the Nation's Cybersecurity

Number of pages: 10 Posted: 20 Jul 2014
MicroSystems Automation Group, Carnegie Mellon University, Georgetown University, Indiana University Bloomington - School of Informatics and Computing and RelayServices
Downloads 237 (133,273)

Abstract:

Loading...

cybersecurity, surveillance, standards, back door, intelligence, law enforcement, policy

17.

Diffusion and Adoption of IPv6 in the Arin Region

Number of pages: 12 Posted: 25 Aug 2008
Hillary Elmore, Brandon Stephens and L. Jean Camp
Indiana University Bloomington - School of Informatics and Computing, Indiana University Bloomington - School of Informatics and Computing and Indiana University Bloomington - School of Informatics and Computing
Downloads 233 (135,501)
Citation 5

Abstract:

Loading...

IPv6, security, privacy, diffusion, internet governance

18.

Systematic Design for Privacy in Ubicomp

Number of pages: 12 Posted: 21 Mar 2006
L. Jean Camp, Kalpana Shankar and Kay Connelly
Indiana University Bloomington - School of Informatics and Computing, School of Informatics and Computer Science
Downloads 220 (143,264)
Citation 1

Abstract:

Loading...

computers and society, public policy issues, privacy, security, information contrtol, data protection

19.

Protecting the Internet from Dictators: Technical and Policy Solutions to Ensure Online Freedoms

Warigia Bowman and L.Jean Camp, "Protecting the Internet from Dictators: Technical and Policy Solutions to Ensure Online Freedoms," The Innovation Journal: The Public Sector Innovation Journal," 18(1), (2013), article 3.
Number of pages: 24 Posted: 07 Jul 2012 Last Revised: 05 Feb 2015
Warigia M. Bowman and L. Jean Camp
University of Tulsa College of Law and Indiana University Bloomington - School of Informatics and Computing
Downloads 190 (164,273)

Abstract:

Loading...

Arab Spring, Deep packet inspection, Sudan, Uganda, VSAT, Libya, redundancy, Egypt, Internet, resilience, distribution, DNS, Governance, technology, freedom, Mubarak, Syria

20.

Code as Speech

KSG Working Paper No. 01-007
Number of pages: 19 Posted: 23 Jul 2001
L. Jean Camp and Kenneth Lewis
Indiana University Bloomington - School of Informatics and Computing and affiliation not provided to SSRN
Downloads 174 (177,798)

Abstract:

Loading...

Business and Government Policy, Information Technology

21.

Phishing in Smooth Waters: The State of Banking Certificates in the US

2014 TPRC Conference Paper
Number of pages: 16 Posted: 10 Feb 2017
Zheng Dong, Kevin Kane and L. Jean Camp
Indiana University, Microsoft Corporation - Microsoft Research - Redmond and Indiana University Bloomington - School of Informatics and Computing
Downloads 117 (245,005)
Citation 1

Abstract:

Loading...

security, policy, consumer protection

22.

Varieties of Software and Their Implications for Effective Democratic Government

Proceedings of the British Academy, Vol. 135, pp. 183-185, 2006
Number of pages: 26 Posted: 31 May 2006
L. Jean Camp
Indiana University Bloomington - School of Informatics and Computing
Downloads 115 (248,102)

Abstract:

Loading...

Business and Government Policy, Information Technology, Open Source, Open Code, free software, Peer production, Transparency

23.

Reliable Usable Signals to Prevent Masquerade Attacks

Number of pages: 21 Posted: 05 Apr 2006
L. Jean Camp
Indiana University Bloomington - School of Informatics and Computing
Downloads 90 (292,715)
Citation 5

Abstract:

Loading...

privacy, trust, signaling, security

24.

When Proof of Work Works

NET Institute Working Paper No. 06-18
Number of pages: 24 Posted: 02 Nov 2006
Debin Liu and L. Jean Camp
Indiana University and Indiana University Bloomington - School of Informatics and Computing
Downloads 83 (307,896)
Citation 4

Abstract:

Loading...

25.

Examining the Jurisdictions of Internet Routes to Prevent Data Exfiltration

Number of pages: 27 Posted: 23 Mar 2016 Last Revised: 21 Jun 2017
Kevin Benton and L. Jean Camp
Indiana University and Indiana University Bloomington - School of Informatics and Computing
Downloads 67 (347,753)
Citation 1

Abstract:

Loading...

26.

Ex Ante vs. Ex Post: Economically Efficient Sanctioning Regimes for Online Risks

TPRC 41: The 41st Research Conference on Communication, Information and Internet Policy
Number of pages: 29 Posted: 02 Apr 2013 Last Revised: 18 Jul 2015
Vaibhav Garg and L. Jean Camp
Drexel University and Indiana University Bloomington - School of Informatics and Computing
Downloads 61 (364,968)
Citation 2

Abstract:

Loading...

Ex-post, Ex-ante, judgement-proof, security, privacy

27.

Privacy Preserving Policy Framework: User-Aware and User-Driven

Number of pages: 11 Posted: 03 Sep 2019 Last Revised: 05 Sep 2019
Sanchari Das, Jayati Dev and L. Jean Camp
Indiana University Bloomington, School of Informatics and Computing, Indiana University Bloomington - School of Informatics and Computing and Indiana University Bloomington - School of Informatics and Computing
Downloads 41 (433,534)

Abstract:

Loading...

privacy policy, compliance, social media, Facebook, privacy preserving, human factors

28.

Making IoT Worthy of Human Trust

Number of pages: 12 Posted: 29 Jul 2019 Last Revised: 16 Aug 2019
Indiana University Bloomington - School of Informatics, Computing & Engineering, Indiana University - Bloomington, School of Informatics, Computing & Engineering, Indiana University Bloomington, School of Informatics and Computing and Indiana University Bloomington - School of Informatics and Computing
Downloads 39 (441,859)

Abstract:

Loading...

IoT, PKI, Security, Privacy

29.

Personalized WhatsApp Privacy: Demographic and Cultural Influences on Indian and Saudi Users

Number of pages: 34 Posted: 06 Jun 2019
Indiana University Bloomington - School of Informatics and Computing, affiliation not provided to SSRN, affiliation not provided to SSRN and Indiana University Bloomington - School of Informatics and Computing
Downloads 30 (482,118)
Citation 2

Abstract:

Loading...

computing, privacy, security, gender, culture, social networks

30.

Proof of Work (Cannot, Can, Does Currently) Work

TPRC 2007
Number of pages: 25 Posted: 27 Jul 2012
L. Jean Camp and Debin Liu
Indiana University Bloomington - School of Informatics and Computing and Indiana University
Downloads 26 (503,158)

Abstract:

Loading...

31.

Towards Implementing Inclusive Authentication Technologies for Older Adults

Who Are You?! Adventures in Authentication (WAY) 2019
Number of pages: 5 Posted: 19 Aug 2019
Indiana University Bloomington, School of Informatics and Computing, Indiana University Bloomington, Indiana University Bloomington, Indiana University Bloomington, School of Informatics and Computing, Students, Indiana University Bloomington - School of Informatics and Computing and Indiana University Bloomington
Downloads 16 (562,322)

Abstract:

Loading...

older adults, multi factor authentication, two factor authentication, inclusive design

32.

Making Security Manifest Security and Autonomy for End Users

TPRC 2003
Number of pages: 9 Posted: 22 May 2012
Allan A. Friedman and L. Jean Camp
Harvard University - Harvard Kennedy School (HKS) and Indiana University Bloomington - School of Informatics and Computing
Downloads 15 (568,551)

Abstract:

Loading...

33.

MFA is a Waste of Time! Understanding Negative Connotation Towards MFA Applications via User Generated Content

In Proceedings of the Thriteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019)
Number of pages: 10 Posted: 19 Aug 2019
Sanchari Das, Bingxing Wang and L. Jean Camp
Indiana University Bloomington, School of Informatics and Computing, Indiana University Bloomington and Indiana University Bloomington - School of Informatics and Computing
Downloads 10 (600,909)
Citation 1

Abstract:

Loading...

Multi Factor Authentication, Sentiment Analysis, User Perception

34.

Evaluating User Perception of Multi-Factor Authentication: A Systematic Review

In Proceedings of the Thriteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019)
Number of pages: 10 Posted: 19 Aug 2019
Indiana University Bloomington, School of Informatics and Computing, Indiana University Bloomington, Indiana University Bloomington and Indiana University Bloomington - School of Informatics and Computing
Downloads 8 (614,304)
Citation 1

Abstract:

Loading...

Multi Factor Authentication, User Studies, Systematic Literature Review

35.

Security Mandates are Pervasive: An Inter-School Study on Analyzing User Authentication Behavior

IEEE Humans and Cyber Security Workshop (HACS 2019)
Number of pages: 8 Posted: 10 Jan 2020
Indiana University Bloomington, School of Informatics and Computing, Indiana University Bloomington, Indiana University Bloomington - School of Informatics and Computing, Indiana University Bloomington, School of Informatics and Computing, Students and Indiana University Bloomington - School of Informatics and Computing
Downloads 5 (634,442)

Abstract:

Loading...

Authentication, Two factor Authentication, Password, Mandatory Tools, User Studies, Educational Institutes

36.

Macroeconomic Analysis of Routing Anomalies

TPRC 44: The 44th Research Conference on Communication, Information and Internet Policy 2016
Posted: 30 Mar 2016
Pablo Moriano, Soumya Achar and L. Jean Camp
Indiana University Bloomington - School of Informatics and Computing, Indiana University Bloomington and Indiana University Bloomington - School of Informatics and Computing

Abstract:

Loading...

BGP Security, Prefix Hijacking, Macroeconomic Indicators, Statistical Modeling, Clustering Analysis

37.

A Review of Security and Human Behaviors

Posted: 07 Jul 2008
L. Jean Camp
Indiana University Bloomington - School of Informatics and Computing

Abstract:

Loading...

security, privacy, psychology, trust, spam, phishing, regulation

38.

MFA is A Necessary Chore! Exploring User Mental Models of Multi-Factor Authentication Technologies

Proceedings of the 53rd Hawaii International Conference on System Sciences | 2020
Number of pages: 10
Indiana University Bloomington, School of Informatics and Computing, Indiana University Bloomington, Indiana University Bloomington and Indiana University Bloomington - School of Informatics and Computing
Downloads 0

Abstract:

Loading...

Multi-factor Authentication, Passwords, Authentication, Two-Factor Authentication, Human Factors, Security