Share This Author
Privacy and rationality in individual decision making
- A. Acquisti, Jens Grossklags
- BusinessIEEE Security & Privacy
- 2005
TLDR
E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior
- S. Spiekermann, Jens Grossklags, Bettina Berendt
- Computer ScienceEC '01
- 14 October 2001
TLDR
When 25 Cents is Too Much: An Experiment on Willingness-To-Sell and Willingness-To-Protect Personal Information
- Jens Grossklags, A. Acquisti
- EconomicsWEIS
- 2007
TLDR
Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools
- Benjamin Johnson, Aron Laszka, Jens Grossklags, Marie Vasek, T. Moore
- Computer ScienceFinancial Cryptography Workshops
- 3 March 2014
TLDR
Stopping spyware at the gate: a user study of privacy, notice and spyware
- Nathaniel Good, Rachna Dhamija, J. Konstan
- Computer ScienceSOUPS '05
- 6 July 2005
TLDR
Secure or insure?: a game-theoretic analysis of information security games
- Jens Grossklags, Nicolas Christin, J. Chuang
- Computer Science, EconomicsWWW
- 21 April 2008
TLDR
An Empirical Study of Web Vulnerability Discovery Ecosystems
- Mingyi Zhao, Jens Grossklags, Peng Liu
- Computer ScienceCCS
- 12 October 2015
TLDR
Third-party apps on Facebook: privacy and the illusion of control
- Na Wang, Heng Xu, Jens Grossklags
- Computer ScienceCHIMIT '11
- 4 December 2011
TLDR
Blue versus Red: Towards a Model of Distributed Security Attacks
- Neal Fultz, Jens Grossklags
- Computer ScienceFinancial Cryptography
- 21 July 2009
We develop a two-sided multiplayer model of security in which attackers aim to deny service and defenders strategize to secure their assets. Attackers benefit from the successful compromise of target…
Uncertainty, Ambiguity and Privacy
- A. Acquisti, Jens Grossklags
- BusinessWEIS
- 2005
TLDR
...
...