Jens Grossklags
Titel
Zitiert von
Zitiert von
Jahr
Privacy and rationality in individual decision making
A Acquisti, J Grossklags
IEEE Security & Privacy 3 (1), 26-33, 2005
11302005
E-privacy in 2nd generation e-commerce: Privacy preferences versus actual behavior
S Spiekermann, J Grossklags, B Berendt
Proceedings of the 3rd ACM Conference on Electronic Commerce, 38-47, 2001
6832001
What can behavioral economics teach us about privacy?
A Acquisti, J Grossklags
Digital Privacy: Theory, Technologies, and Practices, 363-379, 2007
2882007
Secure or insure?: A game-theoretic analysis of information security games
J Grossklags, N Christin, J Chuang
Proceedings of the 17th International Conference on World Wide Web, 209-218, 2008
2842008
When 25 Cents is Too Much: An Experiment on Willingness-To-Sell and Willingness-To-Protect Personal Information.
J Grossklags, A Acquisti
Workshop on the Economics of Information Security (WEIS), 2007
2722007
Privacy attitudes and privacy behavior
A Acquisti, J Grossklags
Economics of information security, 165-178, 2004
2032004
Stopping spyware at the gate: A user study of privacy, notice and spyware
N Good, R Dhamija, J Grossklags, D Thaw, S Aronowitz, D Mulligan, ...
Proceedings of the 2005 Symposium on Usable Privacy and Security, 43-52, 2005
179*2005
Losses, gains, and hyperbolic discounting: An experimental approach to information security attitudes and behavior
A Acquisti, J Grossklags
The Economics of Information Security, 165-178, 2004
1712004
Game-theoretic analysis of DDoS attacks against Bitcoin mining pools
B Johnson, A Laszka, J Grossklags, M Vasek, T Moore
International Conference on Financial Cryptography and Data Security, 72-86, 2014
1652014
Resilient data-centric storage in wireless ad-hoc sensor networks
A Ghose, J Grossklags, J Chuang
International Conference on Mobile Data Management, 45-62, 2003
1582003
Third-party apps on Facebook: Privacy and the illusion of control
N Wang, H Xu, J Grossklags
Proceedings of the 5th ACM Symposium on Computer Human Interaction for …, 2011
1412011
Noticing notice: A large-scale experiment on the timing of software license agreements
NS Good, J Grossklags, DK Mulligan, JA Konstan
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2007
852007
Blue versus red: Towards a model of distributed security attacks
N Fultz, J Grossklags
International Conference on Financial Cryptography and Data Security, 167-183, 2009
812009
When Bitcoin Mining Pools Run Dry
A Laszka, B Johnson, J Grossklags
Financial Cryptography and Data Security 2015, 2015
772015
An empirical study of web vulnerability discovery ecosystems
M Zhao, J Grossklags, P Liu
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
712015
The security cost of cheap user interaction
R Böhme, J Grossklags
Proceedings of the 2011 New Security Paradigms Workshop (NSPW), 67-82, 2011
652011
It’s all about the Benjamins: An empirical study on incentivizing users to ignore security advice
N Christin, S Egelman, T Vidas, J Grossklags
Financial Cryptography and Data Security, 16-30, 2012
642012
Uncertainty, ambiguity and privacy
A Acquisti, J Grossklags
Fourth Annual Workshop Economics and Information Security (WEIS), 2005
642005
The Federal Trade Commission and Consumer Privacy in the Coming Decade
J Turow, CJ Hoofnagle, DK Mulligan, N Good, J Grossklags
I/S: A Journal of Law and Policy for the Information Society (ISJLP) 3 (3 …, 2007
632007
Near rationality and competitive equilibria in networked systems
N Christin, J Grossklags, J Chuang
Proceedings of the ACM SIGCOMM Workshop on Practice and Theory of Incentives …, 2004
592004
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20