|
Search the dblp DataBase
Jens Grossklags:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Nathaniel Good, Jens Grossklags, Deirdre K. Mulligan, Joseph A. Konstan
Noticing notice: a large-scale experiment on the timing of software license agreements. [Citation Graph (0, 0)][DBLP] CHI, 2007, pp:607-616 [Conf]
- Jens Grossklags, Carsten Schmidt
Artificial Software Agents on Thin Double Auction Markets - A Human Trader Experiment. [Citation Graph (0, 0)][DBLP] IAT, 2003, pp:400-410 [Conf]
- Abhishek Ghose, Jens Grossklags, John Chuang
Resilient Data-Centric Storage in Wireless Ad-Hoc Sensor Networks. [Citation Graph (0, 0)][DBLP] Mobile Data Management, 2003, pp:45-62 [Conf]
- Sarah Spiekermann, Jens Grossklags, Bettina Berendt
E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior. [Citation Graph (0, 0)][DBLP] ACM Conference on Electronic Commerce, 2001, pp:38-47 [Conf]
- Nicolas Christin, Jens Grossklags, John Chuang
Near Rationality and Competitive Equilibria in Networked Systems [Citation Graph (0, 0)][DBLP] CoRR, 2004, v:0, n:, pp:- [Journal]
- Abhishek Ghose, Jens Grossklags, John Chuang
Resilient Data-Centric Storage in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] IEEE Distributed Systems Online, 2003, v:4, n:11, pp:- [Journal]
- Alessandro Acquisti, Jens Grossklags
Privacy and Rationality in Individual Decision Making. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2005, v:3, n:1, pp:26-33 [Journal]
- Jens Grossklags, Carsten Schmidt
Software agents and market (in) efficiency: a human trader experiment. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Systems, Man, and Cybernetics, Part C, 2006, v:36, n:1, pp:56-67 [Journal]
Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information. [Citation Graph (, )][DBLP]
Empirical Studies on Software Notices to Inform Policy Makers and Usability Designers. [Citation Graph (, )][DBLP]
Blue versus Red: Towards a Model of Distributed Security Attacks. [Citation Graph (, )][DBLP]
When Information Improves Information Security. [Citation Graph (, )][DBLP]
Predicted and Observed User Behavior in the Weakest-link Security Game. [Citation Graph (, )][DBLP]
Nudge: intermediaries' role in interdependent network security. [Citation Graph (, )][DBLP]
Security and insurance management in networks with heterogeneous agents. [Citation Graph (, )][DBLP]
Secure or insure?: a game-theoretic analysis of information security games. [Citation Graph (, )][DBLP]
Experimental economics and experimental computer science: a survey. [Citation Graph (, )][DBLP]
Stopping spyware at the gate: a user study of privacy, notice and spyware. [Citation Graph (, )][DBLP]
Nudge: Intermediaries' Role in Interdependent Network Security. [Citation Graph (, )][DBLP]
Search in 0.020secs, Finished in 0.021secs
|