The SCEAS System
Navigation Menu

Search the dblp DataBase


Jens Grossklags: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Nathaniel Good, Jens Grossklags, Deirdre K. Mulligan, Joseph A. Konstan
    Noticing notice: a large-scale experiment on the timing of software license agreements. [Citation Graph (0, 0)][DBLP]
    CHI, 2007, pp:607-616 [Conf]
  2. Jens Grossklags, Carsten Schmidt
    Artificial Software Agents on Thin Double Auction Markets - A Human Trader Experiment. [Citation Graph (0, 0)][DBLP]
    IAT, 2003, pp:400-410 [Conf]
  3. Abhishek Ghose, Jens Grossklags, John Chuang
    Resilient Data-Centric Storage in Wireless Ad-Hoc Sensor Networks. [Citation Graph (0, 0)][DBLP]
    Mobile Data Management, 2003, pp:45-62 [Conf]
  4. Sarah Spiekermann, Jens Grossklags, Bettina Berendt
    E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Electronic Commerce, 2001, pp:38-47 [Conf]
  5. Nicolas Christin, Jens Grossklags, John Chuang
    Near Rationality and Competitive Equilibria in Networked Systems [Citation Graph (0, 0)][DBLP]
    CoRR, 2004, v:0, n:, pp:- [Journal]
  6. Abhishek Ghose, Jens Grossklags, John Chuang
    Resilient Data-Centric Storage in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Distributed Systems Online, 2003, v:4, n:11, pp:- [Journal]
  7. Alessandro Acquisti, Jens Grossklags
    Privacy and Rationality in Individual Decision Making. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:1, pp:26-33 [Journal]
  8. Jens Grossklags, Carsten Schmidt
    Software agents and market (in) efficiency: a human trader experiment. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part C, 2006, v:36, n:1, pp:56-67 [Journal]

  9. Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information. [Citation Graph (, )][DBLP]

  10. Empirical Studies on Software Notices to Inform Policy Makers and Usability Designers. [Citation Graph (, )][DBLP]

  11. Blue versus Red: Towards a Model of Distributed Security Attacks. [Citation Graph (, )][DBLP]

  12. When Information Improves Information Security. [Citation Graph (, )][DBLP]

  13. Predicted and Observed User Behavior in the Weakest-link Security Game. [Citation Graph (, )][DBLP]

  14. Nudge: intermediaries' role in interdependent network security. [Citation Graph (, )][DBLP]

  15. Security and insurance management in networks with heterogeneous agents. [Citation Graph (, )][DBLP]

  16. Secure or insure?: a game-theoretic analysis of information security games. [Citation Graph (, )][DBLP]

  17. Experimental economics and experimental computer science: a survey. [Citation Graph (, )][DBLP]

  18. Stopping spyware at the gate: a user study of privacy, notice and spyware. [Citation Graph (, )][DBLP]

  19. Nudge: Intermediaries' Role in Interdependent Network Security. [Citation Graph (, )][DBLP]

Search in 0.020secs, Finished in 0.021secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002