Follow
Jens Grossklags
Title
Cited by
Cited by
Year
Privacy and rationality in individual decision making
A Acquisti, J Grossklags
IEEE Security & Privacy 3 (1), 26-33, 2005
14302005
E-privacy in 2nd generation e-commerce: Privacy preferences versus actual behavior
S Spiekermann, J Grossklags, B Berendt
Proceedings of the 3rd ACM Conference on Electronic Commerce, 38-47, 2001
7972001
What can behavioral economics teach us about privacy?
A Acquisti, J Grossklags
Digital Privacy: Theory, Technologies, and Practices, 363-379, 2007
3672007
When 25 Cents is Too Much: An Experiment on Willingness-To-Sell and Willingness-To-Protect Personal Information.
J Grossklags, A Acquisti
Workshop on the Economics of Information Security (WEIS), 2007
3402007
Secure or insure?: A game-theoretic analysis of information security games
J Grossklags, N Christin, J Chuang
Proceedings of the 17th International Conference on World Wide Web, 209-218, 2008
3162008
Privacy attitudes and privacy behavior: Losses, gains, and hyperbolic discounting
A Acquisti, J Grossklags
Economics of information security, 165-178, 2004
2592004
Game-theoretic analysis of DDoS attacks against Bitcoin mining pools
B Johnson, A Laszka, J Grossklags, M Vasek, T Moore
Financial Cryptography and Data Security: FC 2014 Workshops, BITCOIN and …, 2014
2442014
Losses, gains, and hyperbolic discounting: An experimental approach to information security attitudes and behavior
A Acquisti, J Grossklags
The Economics of Information Security, 165-178, 2004
2062004
Stopping spyware at the gate: A user study of privacy, notice and spyware
N Good, R Dhamija, J Grossklags, D Thaw, S Aronowitz, D Mulligan, ...
Proceedings of the 2005 Symposium on Usable Privacy and Security, 43-52, 2005
1932005
Third-party apps on Facebook: Privacy and the illusion of control
N Wang, H Xu, J Grossklags
Proceedings of the 5th ACM Symposium on Computer Human Interaction for …, 2011
1752011
Resilient data-centric storage in wireless ad-hoc sensor networks
A Ghose, J Grossklags, J Chuang
Mobile Data Management: 4th International Conference, MDM 2003 Melbourne …, 2003
1692003
When Bitcoin Mining Pools Run Dry
A Laszka, B Johnson, J Grossklags
Financial Cryptography and Data Security 2015, 2015
110*2015
An empirical study of web vulnerability discovery ecosystems
M Zhao, J Grossklags, P Liu
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1082015
Noticing notice: A large-scale experiment on the timing of software license agreements
NS Good, J Grossklags, DK Mulligan, JA Konstan
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2007
992007
Given Enough Eyeballs, All Bugs Are Shallow? Revisiting Eric Raymond with Bug Bounty Programs
T Maillart, M Zhao, J Grossklags, J Chuang
Journal of Cybersecurity 3 (2), 81–90, 2017
892017
Blue versus red: Towards a model of distributed security attacks
N Fultz, J Grossklags
Financial Cryptography and Data Security: 13th International Conference, FC …, 2009
852009
Uncertainty, ambiguity and privacy
A Acquisti, J Grossklags
Fourth Annual Workshop Economics and Information Security (WEIS), 2005
832005
The security cost of cheap user interaction
R Böhme, J Grossklags
Proceedings of the 2011 New Security Paradigms Workshop (NSPW), 67-82, 2011
792011
An online experiment of privacy authorization dialogues for social applications
N Wang, J Grossklags, H Xu
Proceedings of the 2013 Conference on Computer Supported Cooperative Work …, 2013
772013
The Federal Trade Commission and Consumer Privacy in the Coming Decade
J Turow, CJ Hoofnagle, DK Mulligan, N Good, J Grossklags
I/S: A Journal of Law and Policy for the Information Society (ISJLP) 3 (3 …, 2007
772007
The system can't perform the operation now. Try again later.
Articles 1–20