L. Jean Camp

Indiana University Bloomington - School of Informatics and Computing

Professor

901 E 10th St

Bloomington, IN 47401

United States

SCHOLARLY PAPERS

54

DOWNLOADS
Rank 4,460

SSRN RANKINGS

Top 4,460

in Total Papers Downloads

16,518

SSRN CITATIONS
Rank 15,032

SSRN RANKINGS

Top 15,032

in Total Papers Citations

72

CROSSREF CITATIONS

26

Scholarly Papers (54)

1.

A Complete Study of P.K.I. (PKI’s Known Incidents)

TPRC47: The 47th Research Conference on Communication, Information and Internet Policy 2019
Number of pages: 45 Posted: 25 Jul 2019 Last Revised: 26 Sep 2019
Nicolas Serrano, Hilda Hadan and L. Jean Camp
Indiana University - Bloomington, School of Informatics, Computing & Engineering, University of Waterloo - Systems Design Engineering and Indiana University Bloomington - School of Informatics and Computing
Downloads 1,651 (20,731)
Citation 3

Abstract:

Loading...

PKI, Trust, Digital Certificate, Certificate Authority, Rogue Certificate, PKI Governance, IoT

2.

Mental Models of Privacy and Security

Number of pages: 13 Posted: 09 Aug 2006
L. Jean Camp
Indiana University Bloomington - School of Informatics and Computing
Downloads 1,317 (29,073)
Citation 5

Abstract:

Loading...

privacy, security, usability

3.

Trust: A Collision of Paradigms

Number of pages: 12 Posted: 08 Mar 2001
Indiana University Bloomington - School of Informatics and Computing, Loyola Marymount University and Cornell Tech NYC
Downloads 1,009 (42,692)
Citation 4

Abstract:

Loading...

information technology

4.

The Privacy Paradox: A Facebook Case Study

2014 TPRC Conference Paper
Number of pages: 40 Posted: 21 Mar 2014 Last Revised: 06 Aug 2014
Vaibhav Garg, Kevin Benton and L. Jean Camp
Drexel University, Indiana University and Indiana University Bloomington - School of Informatics and Computing
Downloads 879 (51,838)
Citation 9

Abstract:

Loading...

Privacy, Usability, Economics, Risk Perception, Facebook, OSNs

5.

Privacy-Enhancing Technologies for Internet Commerce

Number of pages: 16 Posted: 19 Sep 2002
L. Jean Camp and Carlos A. Osorio
Indiana University Bloomington - School of Informatics and Computing and Yuken Impact Research Lab
Downloads 752 (63,785)
Citation 1

Abstract:

Loading...

trust, security, privacy, e-commerce

6.

Economics of Information Security

Number of pages: 14 Posted: 21 Mar 2006
L. Jean Camp
Indiana University Bloomington - School of Informatics and Computing
Downloads 722 (67,232)
Citation 4

Abstract:

Loading...

economics, security, privacy, economics of security

7.

Pricing Security: Vulnerabilities as Externalities

Economics of Information Security, Vol. 12, 2004
Number of pages: 14 Posted: 05 Apr 2006
L. Jean Camp and Catherine Wolfram
Indiana University Bloomington - School of Informatics and Computing and Massachusetts Institute of Technology (MIT) - Sloan School of Management
Downloads 596 (85,724)
Citation 3

Abstract:

Loading...

trust, security, privacy, e-commerce

8.

Factors Influencing Password Reuse: A Case Study

TPRC 46: The 46th Research Conference on Communication, Information and Internet Policy 2018
Number of pages: 9 Posted: 19 Mar 2018 Last Revised: 09 Feb 2024
Jacob Abbott, Daniel Calarco and L. Jean Camp
Indiana University Bloomington - School of Informatics, Computing, and Engineering, Independent and Indiana University Bloomington - School of Informatics and Computing
Downloads 564 (91,835)
Citation 5

Abstract:

Loading...

Passwords, Policies, Requirements, Reuse

9.

Why Don’t Older Adults Adopt Two-Factor Authentication?

Proceedings of the 2020 SIGCHI Workshop on Designing Interactions for the Ageing Populations - Addressing Global Challenges.
Number of pages: 5 Posted: 11 May 2020 Last Revised: 01 Jul 2020
University of Denver, Indiana University Bloomington, Indiana University Bloomington, Indiana University Bloomington, School of Informatics and Computing, Students, Indiana University Bloomington - School of Informatics and Computing and Indiana University Bloomington
Downloads 549 (95,086)
Citation 2

Abstract:

Loading...

Authentication, Security, Older Adults

10.

Code as Governance, the Governance of Code

Number of pages: 31 Posted: 25 Feb 2002
L. Jean Camp and Serena Syme
Indiana University Bloomington - School of Informatics and Computing and Harvard University - Harvard Kennedy School (HKS)
Downloads 523 (100,979)

Abstract:

Loading...

Business and Government Policy, Information Technology

Re-Embedding Existing Social Networks into Online Experiences to Aid in Trust Assessment

Number of pages: 9 Posted: 26 Apr 2005
Alla Genkina and L. Jean Camp
Indiana University Bloomington and Indiana University Bloomington - School of Informatics and Computing
Downloads 505 (104,235)

Abstract:

Loading...

Trust, phishing, Internet, usability, social capital, reputation

Re-Embedding Existing Social Networks into Online Experiences to Aid in Trust Assessment

Posted: 04 Jul 2007
Alla Genkina and L. Jean Camp
Indiana University Bloomington and Indiana University Bloomington - School of Informatics and Computing

Abstract:

Loading...

Trust, phishing, Internet, usability, social capital, reputation

12.

Non-Inclusive Online Security: Older Adults' Experience with Two-Factor Authentication

In Proceedings of the 54th Hawaii International Conference on System Sciences.
Number of pages: 10 Posted: 12 Nov 2020
University of Denver, Indiana University Bloomington, Indiana University Bloomington, Indiana University Bloomington and Indiana University Bloomington - School of Informatics and Computing
Downloads 488 (109,842)

Abstract:

Loading...

Older Adults, Authentication, Password, Multi-Factor Authentication, Hardware Token, Security

13.

Design for Trust

TRUST, REPUTATION AND SECURITY: THEORIES AND PRACTICE, Rino Falcone, ed., Springer-Verlang (Berlin), 2003
Number of pages: 14 Posted: 08 Dec 2004
L. Jean Camp
Indiana University Bloomington - School of Informatics and Computing
Downloads 478 (112,605)

Abstract:

Loading...

Trust, privacy, consumer protection, security, information security

14.

Setting Standards: Looking to the Internet for Models of Governance

Number of pages: 22 Posted: 08 Dec 2004
L. Jean Camp and Charles Vincent
Indiana University Bloomington - School of Informatics and Computing and Harvard University - Harvard Kennedy School (HKS)
Downloads 477 (112,874)
Citation 3

Abstract:

Loading...

Design for values, governance, intellectual property, Internet, open code, privacy, security, standards, technology and society

15.

Drm: Doesn't Really Mean Digital Copyright Management

Number of pages: 12 Posted: 07 Nov 2002
L. Jean Camp
Indiana University Bloomington - School of Informatics and Computing
Downloads 458 (118,393)
Citation 3

Abstract:

Loading...

Information Technology

16.

Risking it All: Unlocking the Backdoor to the Nation's Cybersecurity

Number of pages: 10 Posted: 20 Jul 2014
MicroSystems Automation Group, Carnegie Mellon University, IndependentGeorgetown University, Indiana University Bloomington - School of Informatics and Computing and RelayServices
Downloads 360 (155,908)
Citation 1

Abstract:

Loading...

cybersecurity, surveillance, standards, back door, intelligence, law enforcement, policy

17.

Organizational Security: Implementing a Risk-Reduction-Based Incentivization Model for MFA Adoption

In Proceedings of the International Conference on Financial Cryptography and Data Security, March, 2021, Grenada (Virtual).
Number of pages: 8 Posted: 19 Jan 2021
Sanchari Das, Andrew Kim and L. Jean Camp
University of Denver, Indiana University Bloomington and Indiana University Bloomington - School of Informatics and Computing
Downloads 343 (164,372)

Abstract:

Loading...

Authentication, Multi-Factor Authentication, Risk Communication, User Studies, Organizational Security

18.

Personalized WhatsApp Privacy: Demographic and Cultural Influences on Indian and Saudi Users

Number of pages: 34 Posted: 06 Jun 2019
Indiana University Bloomington - School of Informatics and Computing, University of Denver, affiliation not provided to SSRN and Indiana University Bloomington - School of Informatics and Computing
Downloads 335 (169,043)
Citation 8

Abstract:

Loading...

computing, privacy, security, gender, culture, social networks

19.

IoT Marketplace: Willingness-To-Pay vs. Willingness-To-Accept

In Proceedings of the 20th Annual Workshop on the Economics of Information Security (WEIS 2021).
Number of pages: 24 Posted: 25 Jun 2021
Indiana University Bloomington, Indiana University Bloomington - School of Informatics and Computing, University of Denver and Indiana University Bloomington - School of Informatics and Computing
Downloads 333 (170,694)
Citation 2

Abstract:

Loading...

Willingness-to-pay, Willingness-to-protect, Willingness-to-accept, Experimental economics, Privacy, Information security, Marketplace, IoT, Usable Privacy and Security, Endowment Effect

20.

Identity in Digital Government

Number of pages: 4 Posted: 08 Nov 2004
L. Jean Camp
Indiana University Bloomington - School of Informatics and Computing
Downloads 317 (178,662)
Citation 4

Abstract:

Loading...

Privacy, security, cybersecurity

21.

Protecting the Internet from Dictators: Technical and Policy Solutions to Ensure Online Freedoms

Warigia Bowman and L.Jean Camp, "Protecting the Internet from Dictators: Technical and Policy Solutions to Ensure Online Freedoms," The Innovation Journal: The Public Sector Innovation Journal," 18(1), (2013), article 3.
Number of pages: 24 Posted: 07 Jul 2012 Last Revised: 05 Feb 2015
Warigia M. Bowman and L. Jean Camp
University of Tulsa College of Law and Indiana University Bloomington - School of Informatics and Computing
Downloads 299 (190,102)
Citation 1

Abstract:

Loading...

Arab Spring, Deep packet inspection, Sudan, Uganda, VSAT, Libya, redundancy, Egypt, Internet, resilience, distribution, DNS, Governance, technology, freedom, Mubarak, Syria

22.

Universal Service in a Ubiquitous Digital Network

Number of pages: 12 Posted: 23 Feb 2002
L. Jean Camp and Rose P. Tsang
Indiana University Bloomington - School of Informatics and Computing and Sandia National Laboratories
Downloads 295 (192,758)
Citation 1

Abstract:

Loading...

Business and Government Policy, Information Technology, Welfare/Health Care/Social Policy

23.

Diffusion and Adoption of IPv6 in the Arin Region

Number of pages: 12 Posted: 25 Aug 2008
Hillary Elmore, Brandon Stephens and L. Jean Camp
Indiana University Bloomington - School of Informatics and Computing, Indiana University Bloomington - School of Informatics and Computing and Indiana University Bloomington - School of Informatics and Computing
Downloads 281 (202,676)
Citation 5

Abstract:

Loading...

IPv6, security, privacy, diffusion, internet governance

24.

Towards Implementing Inclusive Authentication Technologies for Older Adults

Who Are You?! Adventures in Authentication (WAY) 2019
Number of pages: 5 Posted: 19 Aug 2019
University of Denver, Indiana University Bloomington, Indiana University Bloomington, Indiana University Bloomington, School of Informatics and Computing, Students, Indiana University Bloomington - School of Informatics and Computing and Indiana University Bloomington
Downloads 272 (209,488)
Citation 1

Abstract:

Loading...

older adults, multi factor authentication, two factor authentication, inclusive design

25.

Systematic Design for Privacy in Ubicomp

Number of pages: 12 Posted: 21 Mar 2006
L. Jean Camp, Kalpana Shankar and Kay Connelly
Indiana University Bloomington - School of Informatics and Computing, School of Informatics and Computer Science
Downloads 247 (230,573)
Citation 1

Abstract:

Loading...

computers and society, public policy issues, privacy, security, information contrtol, data protection

26.

Cross-National Study on Phishing Resilience

In Proceedings of the Workshop on Usable Security and Privacy (USEC), 2021
Number of pages: 11 Posted: 04 Jun 2021
Indiana University Bloomington, Indiana University Bloomington - School of Informatics and Computing, CSIRO Data61, Indiana University, University of Denver and Indiana University Bloomington - School of Informatics and Computing
Downloads 217 (260,971)

Abstract:

Loading...

Phishing, Risk Assessment, Resilience, Cyber Security, Usability, Cross-National, Socio-Technical

27.

MFA is a Waste of Time! Understanding Negative Connotation Towards MFA Applications via User Generated Content

In Proceedings of the Thriteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019)
Number of pages: 10 Posted: 19 Aug 2019
Sanchari Das, Bingxing Wang and L. Jean Camp
University of Denver, Indiana University Bloomington and Indiana University Bloomington - School of Informatics and Computing
Downloads 202 (278,809)
Citation 10

Abstract:

Loading...

Multi Factor Authentication, Sentiment Analysis, User Perception

28.

Code as Speech

Number of pages: 19 Posted: 23 Jul 2001
L. Jean Camp and Kenneth Lewis
Indiana University Bloomington - School of Informatics and Computing and affiliation not provided to SSRN
Downloads 201 (280,056)

Abstract:

Loading...

Business and Government Policy, Information Technology

29.

Phishing in Smooth Waters: The State of Banking Certificates in the US

2014 TPRC Conference Paper
Number of pages: 16 Posted: 10 Feb 2017
Zheng Dong, Kevin Kane and L. Jean Camp
Indiana University, Microsoft Corporation - Microsoft Research - Redmond and Indiana University Bloomington - School of Informatics and Computing
Downloads 157 (347,880)
Citation 2

Abstract:

Loading...

security, policy, consumer protection

30.

Varieties of Software and Their Implications for Effective Democratic Government

Proceedings of the British Academy, Vol. 135, pp. 183-185, 2006
Number of pages: 26 Posted: 31 May 2006
L. Jean Camp
Indiana University Bloomington - School of Informatics and Computing
Downloads 155 (351,665)

Abstract:

Loading...

Business and Government Policy, Information Technology, Open Source, Open Code, free software, Peer production, Transparency

31.

Privacy Preserving Policy Framework: User-Aware and User-Driven

TPRC47: The 47th Research Conference on Communication, Information and Internet Policy 2019
Number of pages: 11 Posted: 03 Sep 2019 Last Revised: 05 Sep 2019
Sanchari Das, Jayati Dev and L. Jean Camp
University of Denver, Indiana University Bloomington - School of Informatics and Computing and Indiana University Bloomington - School of Informatics and Computing
Downloads 141 (379,510)
Citation 1

Abstract:

Loading...

privacy policy, compliance, social media, Facebook, privacy preserving, human factors

32.

Making IoT Worthy of Human Trust

TPRC47: The 47th Research Conference on Communication, Information and Internet Policy 2019
Number of pages: 12 Posted: 29 Jul 2019 Last Revised: 16 Aug 2019
University of Waterloo - Systems Design Engineering, Indiana University - Bloomington, School of Informatics, Computing & Engineering, University of Denver and Indiana University Bloomington - School of Informatics and Computing
Downloads 140 (381,637)
Citation 1

Abstract:

Loading...

IoT, PKI, Security, Privacy

33.

Building An Authentication Infrastructure — Designing a Two Factor Authentication Hardware Token with Form Factor that Encourages Engagement

Number of pages: 22 Posted: 01 Aug 2022 Last Revised: 04 Aug 2022
Indiana University Bloomington, School of Informatics and Computing, Students, Indiana University Bloomington - School of Informatics, Computing, and Engineering, University of Denver and Indiana University Bloomington - School of Informatics and Computing
Downloads 120 (429,503)

Abstract:

Loading...

2fa, authentication, risk communication, usability

34.

Towards a More Secure Ecosystem: Implications for Cybersecurity Labels and SBOMs

Number of pages: 13 Posted: 02 Aug 2023 Last Revised: 09 Feb 2024
Peter J. Caven, Jacob Abbott and L. Jean Camp
Indiana University Bloomington, School of Informatics and Computing, Students, Indiana University Bloomington - School of Informatics, Computing, and Engineering and Indiana University Bloomington - School of Informatics and Computing
Downloads 117 (437,816)

Abstract:

Loading...

Security, Labels, SBOM, Secure Supply Chain

35.

Examining the Jurisdictions of Internet Routes to Prevent Data Exfiltration

Number of pages: 27 Posted: 23 Mar 2016 Last Revised: 21 Jun 2017
Kevin Benton and L. Jean Camp
Indiana University and Indiana University Bloomington - School of Informatics and Computing
Downloads 115 (443,392)
Citation 1

Abstract:

Loading...

36.

When Proof of Work Works

NET Institute Working Paper No. 06-18
Number of pages: 24 Posted: 02 Nov 2006
Debin Liu and L. Jean Camp
Indiana University and Indiana University Bloomington - School of Informatics and Computing
Downloads 115 (443,392)
Citation 9

Abstract:

Loading...

37.

Ex Ante vs. Ex Post: Economically Efficient Sanctioning Regimes for Online Risks

TPRC 41: The 41st Research Conference on Communication, Information and Internet Policy
Number of pages: 29 Posted: 02 Apr 2013 Last Revised: 18 Jul 2015
Vaibhav Garg and L. Jean Camp
Drexel University and Indiana University Bloomington - School of Informatics and Computing
Downloads 109 (461,357)
Citation 2

Abstract:

Loading...

Ex-post, Ex-ante, judgement-proof, security, privacy

38.

Reliable Usable Signals to Prevent Masquerade Attacks

Number of pages: 21 Posted: 05 Apr 2006
L. Jean Camp
Indiana University Bloomington - School of Informatics and Computing
Downloads 106 (470,661)
Citation 4

Abstract:

Loading...

privacy, trust, signaling, security

39.

User-Centered Risk Communication for Safer Browsing

In Proceedings of the First Asia USEC - Workshop on Usable Security, In Conjunction with the Twenty-Fourth International Conference International Conference on Financial Cryptography and Data Security 2020.
Number of pages: 13 Posted: 17 Feb 2020
University of Denver, Indiana University Bloomington - School of Informatics, Computing, and Engineering, Indiana University Bloomington, affiliation not provided to SSRN and Indiana University Bloomington - School of Informatics and Computing
Downloads 103 (480,474)
Citation 8

Abstract:

Loading...

Phishing, Risk Communication, Usable Privacy Security

40.

Evaluating User Perception of Multi-Factor Authentication: A Systematic Review

In Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019)
Number of pages: 10 Posted: 19 Aug 2019 Last Revised: 07 Jul 2020
University of Denver, Indiana University Bloomington, Indiana University Bloomington and Indiana University Bloomington - School of Informatics and Computing
Downloads 99 (493,467)
Citation 8

Abstract:

Loading...

Multi Factor Authentication, User Studies, Systematic Literature Review

41.

Smart Storytelling: Video and Text Risk Communication to Increase MFA Acceptability

In 2020 IEEE Humans and Cyber Security Workshop (HACS 2020) in Association with the 6th IEEE International Conference on Collaboration and Internet Computing (CIC). IEEE, 2020.
Number of pages: 8 Posted: 12 Nov 2020
Sanchari Das, Shrirang Mare and L. Jean Camp
University of Denver, Indiana University Bloomington - School of Informatics and Computing and Indiana University Bloomington - School of Informatics and Computing
Downloads 52 (702,816)
Citation 2

Abstract:

Loading...

Authentication, Multi-Factor Authentication, Risk Communication, User Studies

42.

Lessons in In Privacy and Safety from Interactions with a General Purpose Chatbot

Number of pages: 35 Posted: 29 Feb 2024
Indiana University Bloomington - School of Informatics and Computing, Purdue University - College of Technology, Indiana University Bloomington - School of Informatics, Computing, and Engineering and Indiana University Bloomington - School of Informatics and Computing
Downloads 51 (709,061)

Abstract:

Loading...

AI, computer science, privacy, safety

43.

Quantifying Susceptibility to Spear Phishing in a High School Environment Using Signal Detection Theory

Proceedings of the Fourteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2020)
Number of pages: 10 Posted: 07 Jul 2020 Last Revised: 08 Jul 2020
Ploy Unchit, Sanchari Das, Andrew Kim and L. Jean Camp
affiliation not provided to SSRN, University of Denver, Indiana University Bloomington and Indiana University Bloomington - School of Informatics and Computing
Downloads 46 (740,795)
Citation 4

Abstract:

Loading...

Phishing, Spear Phishing, High School, User Study, Usable Security

44.

SoK: Anatomy of Effective Cybersecurity Label Development

Number of pages: 18 Posted: 31 Oct 2023
Indiana University Bloomington, School of Informatics and Computing, Students, Indiana University Bloomington, Indiana University Bloomington - School of Informatics and Computing and Indiana University Bloomington - School of Informatics and Computing
Downloads 45 (747,580)

Abstract:

Loading...

45.

Proof of Work (Cannot, Can, Does Currently) Work

TPRC 2007
Number of pages: 25 Posted: 27 Jul 2012
L. Jean Camp and Debin Liu
Indiana University Bloomington - School of Informatics and Computing and Indiana University
Downloads 44 (754,448)

Abstract:

Loading...

46.

Security Mandates are Pervasive: An Inter-School Study on Analyzing User Authentication Behavior

IEEE Humans and Cyber Security Workshop (HACS 2019)
Number of pages: 8 Posted: 10 Jan 2020
University of Denver, Indiana University Bloomington, Indiana University Bloomington - School of Informatics and Computing, Indiana University Bloomington, School of Informatics and Computing, Students and Indiana University Bloomington - School of Informatics and Computing
Downloads 35 (820,801)
Citation 4

Abstract:

Loading...

Authentication, Two factor Authentication, Password, Mandatory Tools, User Studies, Educational Institutes

47.

Making Security Manifest Security and Autonomy for End Users

TPRC 2003
Number of pages: 9 Posted: 22 May 2012
Allan A. Friedman and L. Jean Camp
Harvard University - Harvard Kennedy School (HKS) and Indiana University Bloomington - School of Informatics and Computing
Downloads 28 (879,762)

Abstract:

Loading...

48.

Panel: Humans and Technology for Inclusive Privacy and Security

In Proceedings of the Human Factors and Ergonomics Society Annual Meeting, October 2020, Online.
Number of pages: 4 Posted: 19 Jan 2021 Last Revised: 07 Apr 2021
University of Denver, Arizona State University (ASU), Arizona State University (ASU), University of Washington, University of California, Irvine - Department of Informatics, Indiana University Bloomington - School of Informatics and Computing and Oberlin College
Downloads 27 (888,934)
Citation 2

Abstract:

Loading...

Privacy, Security, Inclusivity

49.

A Way Forward: What We Know (or Not) about CSAM & Privacy

Tatiana Renae Ringenberg, Lorraine Kisselburgh, and L Jean Camp, "A Way Forward: What We Know (or Not) about CSAM & Privacy", previous version published at USENIX Engima, 2022 (Friday, June 24, 2022) Santa Clara, CA (https://www.usenix.org/conference/pepr22/presentation/ringenberg)
Number of pages: 7 Posted: 14 Feb 2024
Purdue University - College of Technology, Purdue University - College of Technology and Indiana University Bloomington - School of Informatics and Computing
Downloads 22 (936,187)

Abstract:

Loading...

computer science, CSAM, encryption, privacy, safety, Apple

50.

An Argument and Worked Example: Private DNS as a Human Right

Number of pages: 3 Posted: 22 Oct 2022
L. Jean Camp and Ko Dokmai
Indiana University Bloomington - School of Informatics and Computing and Indiana University
Downloads 21 (946,093)

Abstract:

Loading...

DNS, privacy, networks, Internet governance

51.

Security by Demand: The U.S. Cyber Trust Mark in a Simulated Amazon Purchasing Decision

Posted: 04 Mar 2024
Indiana University Bloomington - School of Informatics, Computing, and Engineering, Indiana University Bloomington, School of Informatics and Computing, Students, Indiana University Bloomington, School of Informatics and Computing, Students and Indiana University Bloomington - School of Informatics and Computing

Abstract:

Loading...

decision-making under uncertainty, behavioral economics, revealed preferences, cybersecurity, labels, Cyber Trust Mark

52.

Building an Authentication Infrastructure

Posted: 02 Aug 2022
Zitao Zhang, Jacob Abbott and L. Jean Camp
Indiana University Bloomington, School of Informatics and Computing, Students, Indiana University Bloomington - School of Informatics, Computing, and Engineering and Indiana University Bloomington - School of Informatics and Computing

Abstract:

Loading...

2fa,authentication,risk communication,usability

53.

Macroeconomic Analysis of Routing Anomalies

TPRC 44: The 44th Research Conference on Communication, Information and Internet Policy 2016
Posted: 30 Mar 2016
Pablo Moriano, Soumya Achar and L. Jean Camp
Indiana University Bloomington - School of Informatics and Computing, Indiana University Bloomington and Indiana University Bloomington - School of Informatics and Computing

Abstract:

Loading...

BGP Security, Prefix Hijacking, Macroeconomic Indicators, Statistical Modeling, Clustering Analysis

54.

A Review of Security and Human Behaviors

Posted: 07 Jul 2008
L. Jean Camp
Indiana University Bloomington - School of Informatics and Computing

Abstract:

Loading...

security, privacy, psychology, trust, spam, phishing, regulation