Publications

 

Submitted Publications

  • Lorenzen-Huber, L., Boutain, M., Camp, L.J., Shankar, K., Connelly, K. (2011). Privacy, Independence, and Relationships: Older Adults’ Perceptions of Home-Based Ubiquitous Technologies. Aging International. (in press)
  • Shankar, K., Jean Camp, L.J., Connelly, K., Huber, L.L. (2011). Aging, Privacy, and Home-Based Computing: Development of a Framework for Design. IEEE Pervasive. (in press)
  • Garg, V., Camp, J.L., Connelly, K., Huber, L. Designing Risk Communication for Older Adults. (2011). Lecture Notes in Computer Science Series (in review).
  • Caine, K., Zimmerman, C., Schall-Zimmerman, Z., Hazelwood, W., Connelly, K., Huber, L., Shankar, K. (2011). Digiswitch: Developing technologies to help elders age in place. (in review).
  • Garg, V., Camp, J.L., Connelly, K. & Huber, L. (2011). “Designing Risk Communication for Older Adults”. Lecture Notes in Computer Science Series.
  • Pimple, K.D. (2011). Computing ethics surrounded by machines. Communications of the ACM, 54(3), 29-31.
  • Caine, K. E., Zimmerman, C. Y., Schall-Zimmerman, Z, Hazelwood, W. R., Sulgrove, A. C., Camp, L. J., Connelly, K. H., Lorenzen-Huber, L. M., & Shankar, K. (2010). DigiSwitch: Design and Evaluation of a Device for Older Adults to Preserve Privacy While Monitoring Health at Home. Proceedings of the ACM SIG on International Health Informatics. Washington, DC.
  • Lorenzen-Huber, L.; Boutain, M.; Camp, L.J.; Shankar, K.; Connelly, K., “Privacy, Independence, and Relationships: Older Adults Perceptions of Home-Based Ubiquitous Technologies.” Ageing International, (2010). Accepted.
  • Camp, L.J.; Shankar, K.; Connelly, K.; Lorenzen-Huber, L., “Re-thinking Westin: Privacy Perspectives in Home-Based Computing.” IEEE, (2010). Accepted.
  • Lorenzen-Huber, L.; Kennedy-Armbruster, C.; Allen, P., “Synergy and Sensibility: Synergy and sensibility: A course on entrepreneurship in gerotechnologies.” Gerontology and Geriatrics Education, p. 181, vol. 31 (2), (2010).
  • Rogers, Y.; Connelly, K.; Hazlewood, W.R.; Tedesco, L., “Enhancing learning: a study of how mobile devices can facilitate”, Personal and Ubiquitous Computing, p. 111, vol. 14, (2010).
  • Liu, D.; Camp, L.J.; Wang, X, “Using Budget-Based Access Control to Manage Operational Risks Caused by Insiders”, Security (2010). Accepted.
  • Shankar, K, “Pervasive Computing and an Aging Populace: Methodological Challenges for Understanding Privacy Implications”, Journal of Information, Communication & Ethics in Society, p. , vol. 8 (10), (2010).
  • Shankar, K.; Connelly, K., “Ethics and Pervasive Technology: A Collaborative Approach to Teaching”, Teaching Ethics, (2010). Submitted.
  • Zimmerman, Z.; Camp, L.J., “Elder-friendly Design’s Effects on Acceptance of Novel Technologies”, Elder Interaction Design CHI, CHI 2010, Workshop, Atlanta, GA (4 April 2010).
  • Caine, K. E., Zimmerman, C. Y., Schall‐Zimmerman, Z, Hazelwood, W. R., Sulgrove, A. C., Camp, L. J., Connelly, K. H., Lorenzen‐Huber, L. M., & Shankar, K. (2010). DigiSwitch: Design and Evaluation of a Device for Older Adults to Preserve Privacy While Monitoring Health at Home. Proceedings of the ACM SIG on International Health Informatics. Arlington, VA.
  • Kalpana Shankar (2010), “Pervasive Computing and an Aging Populace: Methodological Challenges for Understanding Privacy Implications”, Journal of Information, Communication & Ethics in Society, 8, 3, 236-248.
  • Caine, K. E., Zimmerman, C. Y., Schall‐Zimmerman, Z, Hazelwood, W. R., Sulgrove, A. C., Camp, L. J., Connelly, K. H., Lorenzen‐Huber, L. M., & Shankar, K. (2010). “DigiSwitch: Design and Evaluation of a Device for Older Adults to Preserve Privacy While Monitoring Health at Home”. Proceedings of the ACM SIG on International Health Informatics. Arlington, VA.
  • Liu, D.; Camp, L.J.; Wang, X, “Using Budget-Based Access Control to Manage Operational Risks Caused by Insiders”, Security (2010). Accepted.
  • Lorenzen-Huber, L., Boutain, M., Camp, L.J., Shankar, K. & Connelly, K. (2010). “Privacy, Independence, and Relationships: Older Adults Perceptions of Home-Based Ubiquitous Technologies.” Ageing International.
  • Lorenzen-Huber, L., Kennedy-Armbruster & C., Allen, P. (2010). “Synergy and Sensibility: Synergy and Sensibility: A Course on Entrepreneurship in Gerotechnologies.” Gerontology and Geriatrics Education, 31 (2), p. 181.
  • Rogers, Y., Connelly, K., Hazlewood, W.R., & Tedesco, L. (2010). “Enhancing learning: a study of how mobile devices can facilitate”, Personal and Ubiquitous Computing, 14, p. 111.
  • Shankar, K. (2010), “Pervasive Computing and an Aging Populace: Methodological Challenges for Understanding Privacy Implications”, Journal of Information, Communication & Ethics in Society, 8, 3, 236-248.
  • Zimmerman, Z. & Camp, L.J. (2010). “Elder-friendly Design’s Effects on Acceptance of Novel Technologies”, Elder Interaction Design CHI, CHI 2010, Workshop, Atlanta, GA, April 4.
  • Welch, J.L., Siek, K.A., Connelly, K.H., Astroth, K.S., McManus, M.S., Scott, L., Heo, S, & Kraus, M.A. (2009). “Merging Health Literacy with Computer Technology: Self-Managing Diet and Fluid Intake among Adult Hemodialysis Patients”, Patient Education and Counseling, September.
  • Kalpana Shankar, “Methodological Considerations in the Study of Privacy and Home Based Computing”, Journal of Information, Communication, and Ethics in Society (2009). Accepted.
  • Lorenzen-Huber, L., Connelly, K., ” Shaping the next generation of gerontechnologists: Multidisciplinary gerontology vs. computer science”, Gerontechnlogy, (2009). Accepted.
  • Lorenzen-Huber, L.; Boutain, M.; Rogers, W., “Technology, human relationships, and privacy.”, The journal of nutrition, health, and aging, p.621, vol. 13 (1), (2009).
  • Welch, J.L.;, Siek, K.A.; Connelly, K.H.;, Astroth, K.S.; McManus, M.S., Scott, L.; Heo, S, Kraus, M.A., “Merging Health Literacy with Computer Technology: Self-Managing Diet and Fluid Intake among Adult Hemodialysis Patients”, Patient Education and Counseling, September, (2009).
  • L. Jean Camp, “Bringing Models of Privacy and Security” IEEE Technology And Society Magazine (2009) Volume: 28, Issue: 3, Publisher: IEEE, Pages: 37-46.
  • Lorenzen-Huber, L., Boutain, M. & Rogers, W. (2009). “Technology, human relationships, and privacy.” The Journal of Nutrition, Health, and Aging, 13 (1), p. 621.
  • Lorenzen-Huber, L., Connelly, K. (2009). “Shaping the next generation of gerontechnologists: Multidisciplinary gerontology vs. computer science”, Gerontechnlogy.
  • Alex Tsow, Camilo Viecco, and L. Jean Camp, “Privacy-Aware Architecture for Sharing Web Histories”, IBM Systems Journal, (2008). Accepted.
  • L. Jean Camp, “Net Trust: Signaling Malicious Web Sites”, I/S A Journal of Law and Policy in the Information Society,  (2007).

Books or Other One-Time Publications

  • A. Nematzadeh & L. J. Camp, “Threat Analysis of Online Health Information System”, (2010). Published Collection, Published. Editor(s): Samos, GR
    Bibliography: 2010 (Samos, June, 2010. Samos, GR.
  • Lorenzen-Huber, L., Han, S. Samm, M., “What Information, with Whom, and When: In-home Technologies and Privacy”, (2010). Presentation
    Collection: Association for Gerontology in Higher Education
    Bibliography: Reno, NV. March, 2010
  • V. Garg & L. Jean Camp, “How Safe is Safe Enough: The Online Version Workshop on Security and Human Behavior”, (2010). Published.
    Collection: Published.
    Bibliography: Conference proceeding, Published Collection
  • K.A. Siek and K. Connelly, “Achieving Success in Research Collaborations in Health Informatics”, (2010). Book, Published.
    Editor(s): Barbara M. Hayes and William Aspray.
    Collection: Health Informatics: A Patient-Centered Approach to Diabetes
    Bibliography: Cambridge, MA and London, England: MIT Press, 2010
  • Caine, K.E.; Zimmerman, C.Y.; Schall-Zimmerman, Z.; Hazlewood, W.R.; Sulgrove, A.C.; Camp, L.J.; Connelly, K.H.; Lorenzen-Huber,L.M.; & Shankar, K., “DigiSwitch: Design and Evaluation of a Device for Older Adults to Preserve Privacy While Monitoring Health at Home”, (2010). Conference proceedings
    Collection: Proceedings of the Association for Computing Machinery Special Interest Group on International Health Informatics.
    Bibliography: Washington, DC, 2010
  • Lorenzen-Huber, L., “What’s Your Style? Creativity and the Third Age”, (2010). Keynote Address, Keynote presentation
    Collection: Big Ten Retirees Association
    Bibliography: Bloomington, IN. 2010
  • Lorenzen-Huber, L., “What’s Your Style? Creativity and the Third Age”, (2010). Presentation, Presentation given
    Collection: One Day University, IU Alumni Association
    Bibliography: Bloomington, IN. 2010
  • Lorenzen-Huber, L., “What’s Your Style? Creativity, Maturity, and the Alterstill”, (2010). Presentation.
    Collection: Mini University
    Bibliography: Bloomington, IN. 2010
  • Boutain, M. & Lorenzen-Huber, L., “Privacy, technology, and older adults”, (2009). Presentation.
    Collection: American Public Health Association
    Bibliography: Philadelphia, PA. November, 2009.
  • Lorenzen-Huber, L. & Ona, F., “Increasing Functional Physical Activity among Older Adults Using Internet-based Video Conferencing”,(2009). Presentation.
    Collection: American Public Health Association
    Bibliography: Philadelphia, PA. November, 2009
  • Lorenzen-Huber, L., “Perceptions of Privacy in Later Life”, (2009). Presentation.
    Collection: Gerontological Society of America
    Bibliography: Atlanta, GA. November, 2009
  • Lorenzen-Huber, L., Boutain, M., Rogers, W., “Technology, human relationships, and privacy”, (2009). Poster presentation, poster presented.
    Collection: Poster presented at the IAGG World Congress of Gerontology and Geriatrics
    Bibliography: Paris, July 2009
  • Camillo Viecco & L. Jean Camp, “A Risk-Based Approach to Limit the Effects of Covert Channels for Internet Sensor Data Aggregators for Sensor Privacy”, (2009). Conference Proceeding.
    Collection: IFIP International Conference on Trust Management 2009
    Bibliography: June, 2009. West Lafayette, IN
  • Lorenzen-Huber, L., “The Living Lab: Tour a Home of the Future”, (2009). Presentation, Presentation given.
    Collection: Mini University, Indiana University Bloomington
    Bibliography: Bloomington, IN, June 2009
  • J. Duncan, L. Jean Camp & William R. Hazlewood, “The Portal Monitor: A privacy-enhanced event-driven system for elder care”, (2009).
    Conference Proceeding
    Collection: Conference Proceeding
    Bibliography: April 2009. Claremont, CA
  • Lorenzen-Huber, L., Ona, F., Kennedy-Armbruster, C., “Teaching Functional Exercise via Videoconferencing”, (2009). Presentation.
    Collection: American Society on Aging Annual Meeting.
    Bibliography: Las Vegas, NV. March 2009
  • Lorenzen-Huber, L., “Technology Training and Support for Older Adults”, (2009). Presentation, Presentation given.
    Collection: American Society on Aging Annual Meeting
    Bibliography: Las Vegas, NV. March 2009
  • Debin Liu, L Jean Camp & XiaoFeng Wang, “Mitigating Inadvertent Insider Threats with Incentives, Financial Cryptography and Data Security”, (2009). Conference Proceedings.
    Bibliography: February, 2009. Barbados, BWI.
  • Lorenzen-Huber, L., “Re-membering our Bodies: How Memory Works”, (2009). Panel Presentation, Presentation given
    Collection: Invited panel presentation as part of “Bringing Worlds Together Around The Genome: Campus and Community Conversations Across the Arts, the Sciences, and the Field of Ethics.”
    Bibliography: Bloomington, IN, February 2009
  • Boutain, M., Lorenzen-Huber, L., Gieseler, C., “Complacency or Compliancy? Understanding the Privacy Concerns of Older Adults”, (2009). Presentation.
    Collection: Association for Gerontology in Higher Education Annual Meeting
    Bibliography: San Antonio, TX. February 2009.
  • Lorenzen-Huber, L., Foong, P., “Mentoring research experiences for undergraduates: The wii team.”, (2009). Presentation.
    Collection: Association for Gerontology in Higher Education Annual Meeting.
    Bibliography: San Antonio, TX. February 2009.
  • Gleich, P., Friedrich, D., Davis, N., Lorenzen-Huber, L., Gregory, A., “Well-being and dependency concerns of middle-agers to older adults”, (2009). Presentation.
    Collection: Annual Conference of the Southeastern Psychological Association.
    Bibliography: New Orleans, LA. February, 2009.
  • K. A. Siek, K.H. Connelly, B. Chaudry, D. Lambert, J.L. Welch, “Evaluation of Two Mobile Nutrition Tracking Applications for Chronically Ill Populations with Low Literacy Skills”, (2009). Book.
    Editor(s): Joseph Tan and Phillip Olla
    Collection: Mobile Health Solutions for Biomedical Applications.
    Bibliography: Medical Information Science: Hershey, NY.
  • Kalpana Shankar, “Methodological Considerations in the Study of Privacy and Home Based Computing”, Journal of Information, Communication, and Ethics in Society (2009). Accepted.
  • T. Toscos and K. Connelly, “Using Behavior Modification Theory to Understand and Guide Technological Interventions”, (2009). Book.
    Editor(s): Barbara M. Hayes and William Aspray.
    Collection: Health Informatics: A Patient-Centered Approach to Diabetes.
    Bibliography: Cambridge, MA and London, England: MIT Press.
  • Boutain, M., Lorenzen-Huber, L, “New Technologies and Aging: What Do Older Adults Really Want?”, (2008). Book.
    Editor(s): 61st Annual Scientific Meeting of the Gerontological Society of America.
    Collection: 61st Annual Scientific Meeting of the Gerontological Society of America.
    Bibliography: Washington, DC. (November, 2008).
  • Zach Zimmerman, “Surfing with Ambient Trust”, (2008). Conference poster presentation, Accepted.
    Collection: Telecommunications Policy Research Conf. 28-30 Sept 2008, Arlington VA.
    Bibliography: Surfing with Ambient Trust Zack Zimmerman Conf. poster presentation Telecommunications Policy Research Conf. 28-30 Sept., 2008, Arlington VA.
  • Lorenzen-Huber, L., “Brain Teasers”, (2008). presentation, Published.
    Collection: Indiana Medical Association Annual Meeting.
    Bibliography: Indianapolis, IN.(September, 2008).
  • Allen, P. & Lorenzen-Huber, L., “Health, Technology, and Aging”, (2008). Book, Published.
    Editor(s): Seventh Summer Institute of the Chicago Institute for Nursing Education, Nursing Education in the 21st Century: Implications of an Aging Population, Chicago, IL.
    Bibliography: Chicago, IL. (June, 2008).
  • Lorenzen-Huber, Lesa and Connelly, Kay, “Shaping the next generation of gerontechnologist: Multidisciplinary gerontology vs. computer science”, (2008). Conference paper, Accepted.
    Collection: Gerontechnology. Pisa, Italy. June, 2008. Gerontechnlogy, 7 (2), 157 (published abstract).
    Bibliography: Shaping the next generation of gerontechnologist: Multidisciplinary gerontology vs. computer science. Lesa Lorenzen-Huber and Kay Connelly Gerontechnlogy, 7 (2), 157.
  • L Jean Camp, “An Idiosyncratic View of Economics of Securit”, (2008). Book, Published.
    Collection: Interdisciplinary Studies in Information Security Workshop.
    Bibliography: (Monte Verita in Ascona, SW) 7-11 July 2008.
  • Jean Camp, “Mental Models of Security”, (2008). Book, Published.
    Collection: Security & Human Behavior.
    Bibliography: (MIT Cambridge, MA) 2-3 July 2008.
  • Tonya Stroman, “The Inadvertent Insider: Communicating Security Risks”, (2008). Workshop poster presentation, Published.Collection: The Insider Threat in the Networked World, (Durham, NC) 15-16 April 2008. Published.
    Bibliography: The Inadvertent Insider: Communicating Security Risks Tonya Stroman, The Insider Threat in the Networked World, (Durham,NC) 15-16 April 2008.
  • Lesa Lorenzen-Huber, “What personal information do we give away? Privacy in home-based ubiquitous computing.”, (2008). Conference poster, Accepted.
    Collection: American Society on Aging Annual Meeting. Washington, DC. March, 2008.
    Bibliography: What personal information do we give away? Privacy in home-based ubiquitous computing. Lesa Lorenzen-Huber Conference poster American Society on Aging Annual Meeting. Washington, DC.
  • L. Jean Camp, “Communicating Security State using Net Trust”, (2008). Seminar, Published.
    Collection: Google Research Seminar, (Mountain View, CA) 28 Feb. 2008
    Bibliography: L Jean Camp & Brandon Stephens, Communicating Security State using Net Trust, Google Research Seminar, (Mountain View, CA) 28 February 2008.
  • Kalpana Shankar, “Value-Sensitive Design as a Methodology for Information Studies: The ETHOS project”, (2008). Abstract, Accepted.
    Collection: I-School Conference, Los Angeles, CA, 3-5 Feb 2008.
    Bibliography: Value-Sensitive Design as a Methodology for Information Studies: The ETHOS project Kalpana Shankar Abstract I-School
    Conference: Los Angeles, CA, 3-5 Feb 2008.
  • Lesa Lorenzen-Huber, “Health, Technology, and Aging: Can a course influence student career aspirations?”, (2008). Abstract, Accepted.
    Collection: Association for Gerontology in Higher Education Annual Meeting. Baltimore, MD. February, 2008.
    Bibliography: Health, Technology, and Aging: Can a course influence student career aspirations? Lesa Lorenzen-Huber Abstract Association for Gerontology in Higher Education Annual Meeting, Baltimore, MD.
  • Rajasee Rege, Heekyoung Jung, William Hazelwood, Greg Orlov, Kay Connelly, Kalpana Shankar, “Exploring Early Evaluation Techniques of Ambient Health Promoting Devices in Home Environments of Senior Citizens Living Independently”, (2008). Workshop demonstration.
    Collection: HealthNet 2008: 2nd International Workshop on Systems and Networking Support for Healthcare and Assisted Living Environments
    Bibliography: “Exploring Early Evaluation Techniques of Ambient Health Promoting Devices in Home Envs of Senior Citizens Living Independently, HealthNet 2008: 2nd Int’ Wkshp on Sys. & Ntwkg Sup
  • Lorenzen-Huber, L., Connelly, K., “Shaping the next generation of gerontechnologists: Multidisciplinary gerontology vs. computer science.”(2008). Book.
    Editor(s): Meeting of Gerontechnology
    Bibliography: Pisa, Italy (2008).
  • Alex Tsow, Faraneh Asgarpour & L. Jean Camp, “Usability Analysis and User Trust Behaviors of a Social Networking Toolbar”, (2007). Workshop poster presentation, Published
    Collection: APWG eCrime Researchers Summit (Pittsburgh, PA) 4 -5 Oct. 2007.
    Bibliography: Alex Tsow, Faraneh Asgarpour & L. Jean Camp. Usability Analysis and User Trust Behaviors of a Social Networking Toolbar, APWG eCrime Researchers Summit (Pittsburgh, PA) 4 -5 Oct 2007.
  • L Jean Camp, “Privacy in ubiquitous and home computing”, (2007). Seminar, Published.Collection: British Telecom Computer Science Seminar 2007.Bibliography: L Jean Camp Privacy in ubiquitous and home computing. University City London / British Telecom Computer Science Seminar, (Ipswich, UK) 1 August 2007.
  • Farzeneh Asgapour, Debin Liu and L. Jean Camp, “Risk Communication in Computer Security using Mental Models”, (2007). Conference Paper.
    Collection: WEIS 2007, (Pittsburgh, PA) 5-6 June 2007.
    Bibliography: Farzeneh Asgapour, Debin Liu and L. Jean Camp, Risk Communication in Computer Security using Mental Models, WEIS 2007, (Pittsburgh, PA) 5-6 June 2007.
  • L. Jean Camp, “Computer Security and Human Trust Behaviors”, (2007). Workshop presentation, Published.
    Collection: 2007 Decision and Risk Analysis Conference: Convergence Between Finance and Industry (Dallas, TX) 22-23 May 2007.
    Bibliography: L Jean Camp, Computer Security and Human Trust Behaviors, 2007 Decision and Risk Analysis
    Conference: Convergence Between Finance and Industry (Dallas, TX) 22-23 May 2007.
  • L. Jean Camp & Kay Connelly, “Privacy in Ubicomp”, (2007). Book chapter, Published. Collection: Digital Privacy: Theory, Technologies and Practices eds. A Acquisti, S De Capitani di Vimercati, S Gritzalis and C Lambrinoudakis, Taylor & Frances. (New York, NY (2007).
    Bibliography: L. Jean Camp & Kay Connelly, Privacy in Ubicomp, Digital Privacy: Theory, Technologies and Practices eds. Alessandro Acquisti, Sabrina De Capitani di Vimercati, Stefanos Gritzal.
  • Health, Technology and Aging, St. Petersburg, FL, February 2008, IC Aging and Disability Lesa Lorenzen Huber
  • Health, Technology and Aging, Indianapolis, IN February 2008, Living Well, School of HPER Indiana University Lesa Lorenzen Huber
  • Do I Do What I Say?: Observed Versus Stated Privacy Preferences, Ashraf Khalil and Kay Connelly. To appear in the Proceedings of the Eleventh IFIP TC13 International Conference on Human-Computer Interaction (INTERACT), September, 2007.
  • Privacy in ubiquitous and home computing University City London / British Telecom Computer Science Seminar, (Ipswich, UK) 1 August 2007 Jean Camp
  • Computer Security and Human Trust Behaviors 2007 Decision and Risk Analysis Conference: Convergence Between Finance and Industry (Dallas, TX) 22-23 May 2007 Jean Camp
  • Beyond Consent: Privacy in Ubicomp, Jean Camp and Kay Connelly. Book chapter to appear in “Digital Privacy: Theory, Technologies and Practices”
  • Beyond Consent: User Defined Privacy un Ubicomp, L. Jean Camp, Kay Connelly, Lesa Huber, and Kalpana Shankar. In Nurturing Technologies in the Domestic Environment: Feeling Comforted, Cared for, and Connected at Home — a workshop at the Eighth International Conference on Ubiquitous Computing, 2006.
  • Context-aware Telephony: Privacy Preferences and Sharing Patterns, Ashraf Khalil and Kay H. Connelly. In the Proceedings of Computer Supported Collaborative Work (CSCW), 2006.
  • Design for Privacy: Towards a Methodological Approach to Trustworthy Design, Kalpana Shankar, Kay Connelly & L. Jean Camp. In ETHICOMP 2005 (Linköping, Sweden) 12 -14 September, 2005.
  • Fat Finger Worries: How Older and Younger Users Physically Interact with PDAs, Katie A. Siek, Yvonne Rogers, and Kay H. Connelly. In the Proceedings of Interact 2005, LNCS 3585, p.267-280. Rome, Italy, 2005. (Springer Link)
  • Examining the Use of Surveys in Measuring Privacy in Ubiquitous Computing, Ashraf Khalil and Kay Connelly. Workshop in Appropriate Methodology for Empirical Studies of Privacy, INTERACT 05, Rome, Italy, 2005.
  • A Comparative Study of Elderly, Younger, and Chronically Ill Novice PDA Users, Katie A. Moor [Siek], Kay H. Connelly, and Yvonne Rogers. Technical Report 595, Computer Science Department, Indiana University, June 2004.