Follow
Jens Grossklags
Title
Cited by
Cited by
Year
Privacy and rationality in individual decision making
A Acquisti, J Grossklags
IEEE Security & Privacy 3 (1), 26-33, 2005
15832005
E-privacy in 2nd generation e-commerce: Privacy preferences versus actual behavior
S Spiekermann, J Grossklags, B Berendt
Proceedings of the 3rd ACM Conference on Electronic Commerce, 38-47, 2001
8492001
What can behavioral economics teach us about privacy?
A Acquisti, J Grossklags
Digital Privacy: Theory, Technologies, and Practices, 363-379, 2007
3992007
When 25 Cents is Too Much: An Experiment on Willingness-To-Sell and Willingness-To-Protect Personal Information.
J Grossklags, A Acquisti
Workshop on the Economics of Information Security (WEIS), 2007
3662007
Secure or insure?: A game-theoretic analysis of information security games
J Grossklags, N Christin, J Chuang
Proceedings of the 17th International Conference on World Wide Web, 209-218, 2008
3342008
Privacy attitudes and privacy behavior: Losses, gains, and hyperbolic discounting
A Acquisti, J Grossklags
Economics of information security, 165-178, 2004
2842004
Game-theoretic analysis of DDoS attacks against Bitcoin mining pools
B Johnson, A Laszka, J Grossklags, M Vasek, T Moore
Financial Cryptography and Data Security: FC 2014 Workshops, BITCOIN and …, 2014
2682014
Losses, gains, and hyperbolic discounting: An experimental approach to information security attitudes and behavior
A Acquisti, J Grossklags
The Economics of Information Security, 165-178, 2004
2262004
Stopping spyware at the gate: A user study of privacy, notice and spyware
N Good, R Dhamija, J Grossklags, D Thaw, S Aronowitz, D Mulligan, ...
Proceedings of the 2005 Symposium on Usable Privacy and Security, 43-52, 2005
2042005
Third-party apps on Facebook: Privacy and the illusion of control
N Wang, H Xu, J Grossklags
Proceedings of the 5th ACM Symposium on Computer Human Interaction for …, 2011
1902011
Resilient data-centric storage in wireless ad-hoc sensor networks
A Ghose, J Grossklags, J Chuang
Mobile Data Management: 4th International Conference, MDM 2003 Melbourne …, 2003
1652003
An empirical study of web vulnerability discovery ecosystems
M Zhao, J Grossklags, P Liu
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
1182015
When Bitcoin Mining Pools Run Dry
A Laszka, B Johnson, J Grossklags
Financial Cryptography and Data Security 2015, 2015
117*2015
Noticing notice: A large-scale experiment on the timing of software license agreements
NS Good, J Grossklags, DK Mulligan, JA Konstan
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2007
1112007
Given Enough Eyeballs, All Bugs Are Shallow? Revisiting Eric Raymond with Bug Bounty Programs
T Maillart, M Zhao, J Grossklags, J Chuang
Journal of Cybersecurity 3 (2), 81–90, 2017
1042017
Uncertainty, ambiguity and privacy
A Acquisti, J Grossklags
Fourth Annual Workshop Economics and Information Security (WEIS), 2005
892005
Blue versus red: Towards a model of distributed security attacks
N Fultz, J Grossklags
Financial Cryptography and Data Security: 13th International Conference, FC …, 2009
872009
Clear Sanctions, Vague Rewards: How China's Social Credit System Currently Defines "Good" and "Bad" Behavior
S Engelmann, M Chen, F Fischer, C Kao, J Grossklags
Proceedings of the Conference on Fairness, Accountability, and Transparency …, 2019
852019
The security cost of cheap user interaction
R Böhme, J Grossklags
Proceedings of the 2011 New Security Paradigms Workshop (NSPW), 67-82, 2011
802011
An online experiment of privacy authorization dialogues for social applications
N Wang, J Grossklags, H Xu
Proceedings of the 2013 Conference on Computer Supported Cooperative Work …, 2013
782013
The system can't perform the operation now. Try again later.
Articles 1–20