Get my own profile
Public access
View all30 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Aron LaszkaAssistant Professor, Pennsylvania State UniversityVerified email at psu.edu
Benjamin JohnsonUniversity of California, BerkeleyVerified email at ischool.berkeley.edu
John ChuangProfessor, UC Berkeley School of InformationVerified email at ischool.berkeley.edu
Alessandro AcquistiCarnegie Mellon UniversityVerified email at andrew.cmu.edu
Nicolas ChristinCarnegie Mellon UniversityVerified email at andrew.cmu.edu
Severin EngelmannDigital Life Initiative, Cornell Tech, Cornell UniversityVerified email at cornell.edu
Mo ChenTechnical University of MunichVerified email at tum.de
Sadegh FarhangPennsylvania State UniversityVerified email at psu.edu
Mingyi ZhaoNotionVerified email at makenotion.com
Nathan GoodGood ResearchVerified email at goodresearch.com
Rainer BöhmeUniversität Innsbruck, AustriaVerified email at uibk.ac.at
Deirdre K. MulliganUC BerkeleyVerified email at berkeley.edu
Jake WeidmanGoogleVerified email at google.com
Paul MunteanTechnical University of Munich, Chair of IT Security, Post DocVerified email at sec.in.tum.de
Heng XuProfessor of Management, Warrington College of Business, University of FloridaVerified email at ufl.edu
Na WangPh.D., AWSVerified email at amazon.com
Felix FischerChair of Cyber Trust, Technical University of MunichVerified email at tum.de
Yu PuPh.D. Student in Pennsylvania State UniversityVerified email at ist.psu.edu
Sarah SpiekermannVienna University of Economics and Business - Wirtschaftsuniversität Wien (WU)Verified email at wu.ac.at
Chris Jay HoofnagleUniversity of California, Berkeley School of Law, School of InformationVerified email at berkeley.edu
Follow
Jens Grossklags
Chair for Cyber Trust, Technical University of Munich
Verified email at in.tum.de - Homepage