The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Alessandro Acquisti: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jeffrey M. Bradshaw, Andrzej Uszok, Renia Jeffers, Niranjan Suri, Patrick J. Hayes, Mark H. Burstein, Alessandro Acquisti, Brett Benyo, Maggie R. Breedy, Marco M. Carvalho, David J. Diller, Matt Johnson, Shriniwas Kulkarni, James Lott, Maarten Sierhuis, Ron van Hoof
    Representation and reasoning for DAML-based policy and domain services in KAoS and nomads. [Citation Graph (0, 0)][DBLP]
    AAMAS, 2003, pp:835-842 [Conf]
  2. Ponnurangam Kumaraguru, Yong Rhee, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong, Elizabeth Nunge
    Protecting people from phishing: the design and evaluation of an embedded training email system. [Citation Graph (0, 0)][DBLP]
    CHI, 2007, pp:905-914 [Conf]
  3. Alessandro Acquisti, Roger Dingledine, Paul F. Syverson
    On the Economics of Anonymity. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2003, pp:84-102 [Conf]
  4. Alessandro Acquisti, Ralph Gross
    Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2006, pp:36-58 [Conf]
  5. Alessandro Acquisti
    Privacy in electronic commerce and the economics of immediate gratification. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Electronic Commerce, 2004, pp:21-29 [Conf]
  6. Ralph Gross, Alessandro Acquisti, H. John Heinz III
    Information revelation and privacy in online social networks. [Citation Graph (0, 0)][DBLP]
    WPES, 2005, pp:71-80 [Conf]
  7. Alessandro Acquisti, Jens Grossklags
    Privacy and Rationality in Individual Decision Making. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:1, pp:26-33 [Journal]

  8. Timing is everything?: the effects of timing and placement of online privacy indicators. [Citation Graph (, )][DBLP]


  9. Countermeasures against Government-Scale Monetary Forgery. [Citation Graph (, )][DBLP]


  10. Trust modelling for online transactions: a phishing scenario. [Citation Graph (, )][DBLP]


  11. Getting users to pay attention to anti-phishing education: evaluation of retention and transfer. [Citation Graph (, )][DBLP]


  12. Power strips, prophylactics, and privacy, oh my! [Citation Graph (, )][DBLP]


  13. Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish. [Citation Graph (, )][DBLP]


  14. The impact of privacy indicators on search engine browsing patterns. [Citation Graph (, )][DBLP]


  15. School of phish: a real-word evaluation of anti-phishing training. [Citation Graph (, )][DBLP]


Search in 0.033secs, Finished in 0.034secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002