Jens Grossklags
Orcid: 0000-0003-1093-1282Affiliations:
- Technical University Munich, Germany
- Pennsylvania State University, University Park, USA (former)
According to our database1,
Jens Grossklags
authored at least 168 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on in.tum.de
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Vulnerabilities of Data Protection in Vertical Federated Learning Training and Countermeasures.
IEEE Trans. Inf. Forensics Secur., 2024
"Good and Scary at the Same Time" - Exploring Citizens' Perceptions of a Prospective Metaverse.
IEEE Pervasive Comput., 2024
Proc. ACM Hum. Comput. Interact., 2024
Distributed Synthetic Time-Series Data Generation With Local Differentially Private Federated Learning.
IEEE Access, 2024
PoLLMgraph: Unraveling Hallucinations in Large Language Models via State Transition Dynamics.
Proceedings of the Findings of the Association for Computational Linguistics: NAACL 2024, 2024
Attitudes Toward Facial Analysis AI: A Cross-National Study Comparing Argentina, Kenya, Japan, and the USA.
Proceedings of the 2024 ACM Conference on Fairness, Accountability, and Transparency, 2024
How the Types of Consequences in Social Scoring Systems Shape People's Perceptions and Behavioral Reactions.
Proceedings of the 2024 ACM Conference on Fairness, Accountability, and Transparency, 2024
Mapping the Stakeholder Debate on Facial Recognition Technologies: Review and Stakeholder Workshop.
Proceedings of the Companion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing, 2024
Proceedings of the 30th Americas Conference on Information Systems: Elevating Life through Digital Social Entrepreneurship, 2024
2023
Proc. Priv. Enhancing Technol., April, 2023
The Unsung Heroes of Facebook Groups Moderation: A Case Study of Moderation Practices and Tools.
Proc. ACM Hum. Comput. Interact., April, 2023
Breaking the Silence: Investigating Which Types of Moderation Reduce Negative Effects of Sexist Social Media Content.
Proc. ACM Hum. Comput. Interact., 2023
CoRR, 2023
The Benefits of Vulnerability Discovery and Bug Bounty Programs: Case Studies of Chromium and Firefox.
Proceedings of the ACM Web Conference 2023, 2023
Bug Hunters' Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem.
Proceedings of the 32nd USENIX Security Symposium, 2023
Factors Influencing Perceived Legitimacy of Social Scoring Systems: Subjective Privacy Harms and the Moderating Role of Transparency.
Proceedings of the 44th International Conference on Information Systems, 2023
Exploring the Reflective Space of AI Narratives Through Speculative Design in Japan and Germany.
Proceedings of the 2023 ACM Conference on Information Technology for Social Good, 2023
A Reflection on How Cross-Cultural Perspectives on the Ethics of Facial Analysis AI Can Inform EU Policymaking.
Proceedings of the 2nd European Workshop on Algorithmic Fairness, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
E-government HCI in China: How Does the Government Communicate a New Regulation System to the Public?
Asian CHI, 2023
Proceedings of the Annual Computer Security Applications Conference, 2023
2022
Work Experience as a Factor in Cyber-Security Risk Awareness: A Survey Study with University Students.
J. Cybersecur. Priv., June, 2022
SignDS-FL: Local Differentially Private Federated Learning with Sign-based Dimension Selection.
ACM Trans. Intell. Syst. Technol., 2022
Proc. Priv. Enhancing Technol., 2022
Comprehensive Analysis of Privacy Leakage in Vertical Federated Learning During Prediction.
Proc. Priv. Enhancing Technol., 2022
Privacy-Preserving High-dimensional Data Collection with Federated Generative Autoencoder.
Proc. Priv. Enhancing Technol., 2022
Proc. Priv. Enhancing Technol., 2022
A Hierarchical Macroeconomic Copula Model for Cyber Damages Based on Current Cyber Insurance Prices.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022
Proceedings of the 25th International Symposium on Research in Attacks, 2022
Online Service Switching Intentions and Attitudes towards Data Portability - The Role of Technology-related Attitudes and Privacy.
Proceedings of the MuC '22: Mensch und Computer 2022, Darmstadt Germany, September 4, 2022
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022
Proceedings of the FAccT '22: 2022 ACM Conference on Fairness, Accountability, and Transparency, Seoul, Republic of Korea, June 21, 2022
Proceedings of the Equity and Access in Algorithms, Mechanisms, and Optimization, 2022
Social Media Profiling Continues to Partake in the Development of Formalistic Self-Concepts. Social Media Users Think So, Too.
Proceedings of the AIES '22: AAAI/ACM Conference on AI, Ethics, and Society, Oxford, United Kingdom, May 19, 2022
Ordinary People as Moral Heroes and Foes: Digital Role Model Narratives Propagate Social Norms in China's Social Credit System.
Proceedings of the AIES '22: AAAI/ACM Conference on AI, Ethics, and Society, Oxford, United Kingdom, May 19, 2022
2021
Data Portability between Online Services: An Empirical Analysis on the Effectiveness of GDPR Art. 20.
Proc. Priv. Enhancing Technol., 2021
Proc. ACM Hum. Comput. Interact., 2021
Erratum to: The Right to Data Portability: conception, status quo, and future directions.
Inform. Spektrum, 2021
Inform. Spektrum, 2021
Integrating Cybersecurity and Artificial Intelligence Research in Engineering and Computer Science Education.
IEEE Secur. Priv., 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021
The Transparency of the Chinese Social Credit System from the Perspective of German Organizations.
Proceedings of the 29th European Conference on Information Systems, 2021
The Effect of Google Search on Software Security: Unobtrusive Security Interventions via Content Re-ranking.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Blacklists and Redlists in the Chinese Social Credit System: Diversity, Flexibility, and Comprehensiveness.
Proceedings of the AIES '21: AAAI/ACM Conference on AI, 2021
2020
Proc. Priv. Enhancing Technol., 2020
Assessing the current state of information security policies in academic organizations.
Inf. Comput. Secur., 2020
Should users participate in governing social media? Philosophical and technical considerations of democratic social media.
First Monday, 2020
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
Proceedings of the Security and Trust Management - 16th International Workshop, 2020
Security onboarding: an interview study on security training for temporary employees.
Proceedings of the Mensch und Computer 2020 - Tagungsband, 2020
Proceedings of the Human Aspects of Information Security and Assurance, 2020
Nothing Standard About It: An Analysis of Minimum Security Standards in Organizations.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020
Analysis of Darknet Market Activity as a Country-Specific, Socio-Economic and Technological Phenomenon.
Proceedings of the APWG Symposium on Electronic Crime Research, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
On Sharing Intentions, and Personal and Interdependent Privacy Considerations for Genetic Data: A Vignette Study.
IEEE ACM Trans. Comput. Biol. Bioinform., 2019
A game-theoretic model for users' participation in ephemeral social vehicular networks.
Int. J. Commun. Syst., 2019
The Positive Impact of Task Familiarity, Risk Propensity, and Need For Cognition on Observed Timing Decisions in a Security Game.
Games, 2019
Hey Google, What Exactly Do Your Security Patches Tell Us? A Large-Scale Empirical Study on Android Patched Vulnerabilities.
CoRR, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards Stronger Cryptography.
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the Adjunct Publication of the 27th Conference on User Modeling, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 41st International Conference on Software Engineering, 2019
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019
Clear Sanctions, Vague Rewards: How China's Social Credit System Currently Defines "Good" and "Bad" Behavior.
Proceedings of the Conference on Fairness, Accountability, and Transparency, 2019
The Differences in Data Sensitivity Perceptions among Private and Workplace Health Apps: A Delphi Study.
Proceedings of the 9th International Conference on Digital Public Health, 2019
Report Now. Report Effectively. Conceptualizing the Industry Practice for Cybercrime Reporting.
Proceedings of the 2019 APWG Symposium on Electronic Crime Research, 2019
The Acceptable State: an Analysis of the current State of Acceptable Use Policies in Academic Institutions.
Proceedings of the 27th European Conference on Information Systems, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
ACM Trans. Internet Techn., 2018
ACM Trans. Internet Techn., 2018
EAI Endorsed Trans. Security Safety, 2018
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
Sharing is Caring: Collaborative Analysis and Real-Time Enquiry for Security Analytics.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018
Proceedings of the Financial Cryptography and Data Security, 2018
An Economic Study of the Effect of Android Platform Fragmentation on Security Updates.
Proceedings of the Financial Cryptography and Data Security, 2018
Proceedings of the Computer Security, 2018
Proceedings of the Privacy Technologies and Policy - 6th Annual Privacy Forum, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
Given enough eyeballs, all bugs are shallow? Revisiting Eric Raymond with bug bounty programs.
J. Cybersecur., 2017
When to Invest in Security? Empirical Evidence and a Game-Theoretic Approach for Time-Based Security.
CoRR, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017
"Hello. This is the IRS calling.": A case study on scams, extortion, impersonation, and phone spoofing.
Proceedings of the 2017 APWG Symposium on Electronic Crime Research, 2017
I Like It, but I Hate It: Employee Perceptions Towards an Institutional Transition to BYOD Second-Factor Authentication.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
Towards a Model on the Factors Influencing Social App Users' Valuation of Interdependent Privacy.
Proc. Priv. Enhancing Technol., 2016
Human-Computer Interaction and International Public Policymaking: A Framework for Understanding and Taking Future Actions.
Found. Trends Hum. Comput. Interact., 2016
FlipLeakage: A Game-Theoretic Approach to Protect Against Stealthy Attackers in the Presence of Information Leakage.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Proceedings of the 2016 APWG Symposium on Electronic Crime Research, 2016
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
2015
Trans. Data Hiding Multim. Secur., 2015
Using Conjoint Analysis to Investigate the Value of Interdependent Privacy in Social App Adoption Scenarios.
Proceedings of the International Conference on Information Systems, 2015
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015
When Bitcoin Mining Pools Run Dry - A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools.
Proceedings of the Financial Cryptography and Data Security, 2015
A Short Paper on the Incentives to Share Private Information for Population Estimates.
Proceedings of the Financial Cryptography and Data Security, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
A Game-Theoretic Study on Non-monetary Incentives in Data Analytics Projects with Privacy Implications.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
ACM Trans. Internet Techn., 2014
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014
An Economic Model and Simulation Results of App Adoption Decisions on Networks with Interdependent Privacy Consequences.
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014
Proceedings of the Financial Cryptography and Data Security, 2014
Proceedings of the Financial Cryptography and Data Security, 2014
An Online Experiment on Consumers' susceptibility to Fall for Post-Transaction Marketing Scams.
Proceedings of the 22st European Conference on Information Systems, 2014
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014
How Task Familiarity and Cognitive Predispositions Impact Behavior in a Security Game of Timing.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014
Proceedings of the Computer Supported Cooperative Work, 2014
An Exploratory Study of White Hat Behaviors in a Web Vulnerability Disclosure Program.
Proceedings of the 2014 ACM Workshop on Security Information Workers, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
Mitigating Covert Compromises - A Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks.
Proceedings of the Web and Internet Economics - 9th International Conference, 2013
Proceedings of the Web and Internet Economics - 9th International Conference, 2013
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013
Proceedings of the Decision and Game Theory for Security - 4th International Conference, 2013
A game-theoretic analysis of content-adaptive steganography with independent embedding.
Proceedings of the 21st European Signal Processing Conference, 2013
Managing the Weakest Link - A Game-Theoretic Approach for the Mitigation of Insider Threats.
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the Computer Supported Cooperative Work, 2013
Proceedings of the Economics of Information Security and Privacy, 2013
2012
Young adults' online participation behaviors: An exploratory study of web 2.0 use for political engagement.
Inf. Polity, 2012
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012
Proceedings of the International Conference on Information Systems, 2012
Proceedings of the Financial Cryptography and Data Security, 2012
2011
Proceedings of the 2011 New Security Paradigms Workshop, 2011
Proceedings of the Decision and Game Theory for Security - Second International Conference, 2011
Proceedings of the Game Theory for Networks - 2nd International ICST Conference, 2011
It's All about the Benjamins: An Empirical Study on Incentivizing Users to Ignore Security Advice.
Proceedings of the Financial Cryptography and Data Security, 2011
Young adults and online political participation: search strategies and the role of social media.
Proceedings of the 12th Annual International Conference on Digital Government Research, 2011
2010
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Proceedings of the Decision and Game Theory for Security, 2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information.
Proceedings of the Computer Security, 2010
2009
Proceedings of the 8th Annual Workshop on the Economics of Information Security, 2009
Proceedings of the 1st International Conference on Game Theory for Networks, 2009
Proceedings of the Financial Cryptography and Data Security, 2009
2008
Proceedings of the 17th International Conference on World Wide Web, 2008
Security Investment (Failures) in Five Economic Environments: A Comparison of Homogeneous and Heterogeneous User Agents.
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008
Proceedings of the Proceedings 9th ACM Conference on Electronic Commerce (EC-2008), 2008
Proceedings of the Usability, Psychology, and Security, 2008
2007
When 25 Cents is Too Much: An Experiment on Willingness-To-Sell and Willingness-To-Protect Personal Information.
Proceedings of the 6th Annual Workshop on the Economics of Information Security, 2007
Empirical Studies on Software Notices to Inform Policy Makers and Usability Designers.
Proceedings of the Financial Cryptography and Data Security, 2007
Proceedings of the Workshop on Experimental Computer Science, 2007
Noticing notice: a large-scale experiment on the timing of software license agreements.
Proceedings of the 2007 Conference on Human Factors in Computing Systems, 2007
2006
IEEE Trans. Syst. Man Cybern. Part C, 2006
2005
Proceedings of the 4th Annual Workshop on the Economics of Information Security, 2005
Proceedings of the 1st Symposium on Usable Privacy and Security, 2005
2004
Proceedings of the Economics of Information Security, 2004
2003
Resilient Data-Centric Storage in Wireless Sensor Networks.
IEEE Distributed Syst. Online, 2003
Proceedings of the Mobile Data Management, 4th International Conference, MDM 2003, 2003
Artificial Software Agents on Thin Double Auction Markets - A Human Trader Experiment.
Proceedings of the 2003 IEEE/WIC International Conference on Intelligent Agent Technology (IAT 2003), 2003
2001
Proceedings of the Proceedings 3rd ACM Conference on Electronic Commerce (EC-2001), 2001