Jens Grossklags
Titre
Citée par
Citée par
Année
Privacy and rationality in individual decision making
A Acquisti, J Grossklags
IEEE Security & Privacy 3 (1), 26-33, 2005
10832005
E-privacy in 2nd generation e-commerce: Privacy preferences versus actual behavior
S Spiekermann, J Grossklags, B Berendt
Proceedings of the 3rd ACM Conference on Electronic Commerce, 38-47, 2001
6732001
Secure or insure?: A game-theoretic analysis of information security games
J Grossklags, N Christin, J Chuang
Proceedings of the 17th International Conference on World Wide Web, 209-218, 2008
2802008
What can behavioral economics teach us about privacy?
A Acquisti, J Grossklags
Digital Privacy: Theory, Technologies, and Practices, 363-379, 2007
2772007
When 25 Cents is Too Much: An Experiment on Willingness-To-Sell and Willingness-To-Protect Personal Information.
J Grossklags, A Acquisti
Workshop on the Economics of Information Security (WEIS), 2007
2622007
Privacy attitudes and privacy behavior
A Acquisti, J Grossklags
Economics of information security, 165-178, 2004
1972004
Stopping spyware at the gate: A user study of privacy, notice and spyware
N Good, R Dhamija, J Grossklags, D Thaw, S Aronowitz, D Mulligan, ...
Proceedings of the 2005 Symposium on Usable Privacy and Security, 43-52, 2005
178*2005
Losses, gains, and hyperbolic discounting: An experimental approach to information security attitudes and behavior
A Acquisti, J Grossklags
The Economics of Information Security, 165-178, 2004
1662004
Resilient data-centric storage in wireless ad-hoc sensor networks
A Ghose, J Grossklags, J Chuang
International Conference on Mobile Data Management, 45-62, 2003
1572003
Game-theoretic analysis of DDoS attacks against Bitcoin mining pools
B Johnson, A Laszka, J Grossklags, M Vasek, T Moore
International Conference on Financial Cryptography and Data Security, 72-86, 2014
1502014
Third-party apps on Facebook: Privacy and the illusion of control
N Wang, H Xu, J Grossklags
Proceedings of the 5th ACM Symposium on Computer Human Interaction for …, 2011
1372011
Noticing notice: A large-scale experiment on the timing of software license agreements
NS Good, J Grossklags, DK Mulligan, JA Konstan
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2007
832007
Blue versus red: Towards a model of distributed security attacks
N Fultz, J Grossklags
International Conference on Financial Cryptography and Data Security, 167-183, 2009
782009
When Bitcoin Mining Pools Run Dry
A Laszka, B Johnson, J Grossklags
Financial Cryptography and Data Security 2015, 2015
742015
Uncertainty, ambiguity and privacy
A Acquisti, J Grossklags
Fourth Annual Workshop Economics and Information Security (WEIS), 2005
642005
The security cost of cheap user interaction
R Böhme, J Grossklags
Proceedings of the 2011 New Security Paradigms Workshop (NSPW), 67-82, 2011
632011
It’s all about the Benjamins: An empirical study on incentivizing users to ignore security advice
N Christin, S Egelman, T Vidas, J Grossklags
Financial Cryptography and Data Security, 16-30, 2012
622012
The Federal Trade Commission and Consumer Privacy in the Coming Decade
J Turow, CJ Hoofnagle, DK Mulligan, N Good, J Grossklags
I/S: A Journal of Law and Policy for the Information Society (ISJLP) 3 (3 …, 2007
602007
An empirical study of web vulnerability discovery ecosystems
M Zhao, J Grossklags, P Liu
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
592015
Near rationality and competitive equilibria in networked systems
N Christin, J Grossklags, J Chuang
Proceedings of the ACM SIGCOMM Workshop on Practice and Theory of Incentives …, 2004
592004
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20