Follow
Jens Grossklags
Title
Cited by
Cited by
Year
Privacy and rationality in individual decision making
A Acquisti, J Grossklags
IEEE Security & Privacy 3 (1), 26-33, 2005
16772005
E-privacy in 2nd generation e-commerce: Privacy preferences versus actual behavior
S Spiekermann, J Grossklags, B Berendt
Proceedings of the 3rd ACM Conference on Electronic Commerce, 38-47, 2001
8702001
What can behavioral economics teach us about privacy?
A Acquisti, J Grossklags
Digital Privacy: Theory, Technologies, and Practices, 363-379, 2007
4282007
When 25 Cents is Too Much: An Experiment on Willingness-To-Sell and Willingness-To-Protect Personal Information.
J Grossklags, A Acquisti
Workshop on the Economics of Information Security (WEIS), 2007
3752007
Secure or insure?: A game-theoretic analysis of information security games
J Grossklags, N Christin, J Chuang
Proceedings of the 17th International Conference on World Wide Web, 209-218, 2008
3362008
Privacy attitudes and privacy behavior: Losses, gains, and hyperbolic discounting
A Acquisti, J Grossklags
Economics of information security, 165-178, 2004
2932004
Game-theoretic analysis of DDoS attacks against Bitcoin mining pools
B Johnson, A Laszka, J Grossklags, M Vasek, T Moore
Financial Cryptography and Data Security: FC 2014 Workshops, BITCOIN and …, 2014
2852014
Losses, gains, and hyperbolic discounting: An experimental approach to information security attitudes and behavior
A Acquisti, J Grossklags
The Economics of Information Security, 165-178, 2004
2342004
Stopping spyware at the gate: A user study of privacy, notice and spyware
N Good, R Dhamija, J Grossklags, D Thaw, S Aronowitz, D Mulligan, ...
Proceedings of the 2005 Symposium on Usable Privacy and Security, 43-52, 2005
2072005
Third-party apps on Facebook: Privacy and the illusion of control
N Wang, H Xu, J Grossklags
Proceedings of the 5th ACM Symposium on Computer Human Interaction for …, 2011
1982011
Resilient data-centric storage in wireless ad-hoc sensor networks
A Ghose, J Grossklags, J Chuang
Mobile Data Management: 4th International Conference, MDM 2003 Melbourne …, 2003
1642003
An empirical study of web vulnerability discovery ecosystems
M Zhao, J Grossklags, P Liu
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
1252015
When Bitcoin Mining Pools Run Dry
A Laszka, B Johnson, J Grossklags
Financial Cryptography and Data Security 2015, 2015
121*2015
Given Enough Eyeballs, All Bugs Are Shallow? Revisiting Eric Raymond with Bug Bounty Programs
T Maillart, M Zhao, J Grossklags, J Chuang
Journal of Cybersecurity 3 (2), 81–90, 2017
1172017
Noticing notice: A large-scale experiment on the timing of software license agreements
NS Good, J Grossklags, DK Mulligan, JA Konstan
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2007
1142007
Clear Sanctions, Vague Rewards: How China's Social Credit System Currently Defines "Good" and "Bad" Behavior
S Engelmann, M Chen, F Fischer, C Kao, J Grossklags
Proceedings of the Conference on Fairness, Accountability, and Transparency …, 2019
1002019
Uncertainty, ambiguity and privacy
A Acquisti, J Grossklags
Fourth Annual Workshop Economics and Information Security (WEIS), 2005
962005
Blue versus red: Towards a model of distributed security attacks
N Fultz, J Grossklags
Financial Cryptography and Data Security: 13th International Conference, FC …, 2009
872009
The security cost of cheap user interaction
R Böhme, J Grossklags
Proceedings of the 2011 New Security Paradigms Workshop (NSPW), 67-82, 2011
842011
Devising Effective Policies for Bug-Bounty Platforms and Security Vulnerability Discovery
M Zhao, A Laszka, J Grossklags
Journal of Information Policy, 2017
822017
The system can't perform the operation now. Try again later.
Articles 1–20