Get my own profile
Public access
View all29 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Aron LaszkaAssistant Professor, Pennsylvania State UniversityVerified email at psu.edu
- Benjamin JohnsonUniversity of California, BerkeleyVerified email at ischool.berkeley.edu
- John ChuangProfessor, UC Berkeley School of InformationVerified email at ischool.berkeley.edu
- Alessandro AcquistiCarnegie Mellon UniversityVerified email at andrew.cmu.edu
- Nicolas ChristinCarnegie Mellon UniversityVerified email at andrew.cmu.edu
- Mo ChenTechnical University of MunichVerified email at tum.de
- Sadegh FarhangPennsylvania State UniversityVerified email at psu.edu
- Nathan GoodGood ResearchVerified email at goodresearch.com
- Rainer BöhmeUniversität Innsbruck, AustriaVerified email at uibk.ac.at
- Mingyi ZhaoNotionVerified email at makenotion.com
- Deirdre K. MulliganUC BerkeleyVerified email at berkeley.edu
- Jake WeidmanGoogleVerified email at google.com
- Dr. Paul MunteanTechnical University of Munich, Chair of IT Security, PostDocVerified email at sec.in.tum.de
- Heng XuProfessor of Management, Warrington College of Business, University of FloridaVerified email at ufl.edu
- Na WangPh.D., AWSVerified email at amazon.com
- Yu PuPh.D. Student in Pennsylvania State UniversityVerified email at ist.psu.edu
- Felix FischerChair of Cyber Trust, Technical University of MunichVerified email at tum.de
- Sarah SpiekermannVienna University of Economics and Business - Wirtschaftsuniversität Wien (WU)Verified email at wu.ac.at
- Joseph A. KonstanUniversity of MinnesotaVerified email at umn.edu
- Chris Jay HoofnagleUniversity of California, Berkeley School of Law, School of InformationVerified email at berkeley.edu
Follow
Jens Grossklags
Chair for Cyber Trust, Technical University of Munich
Verified email at in.tum.de - Homepage