PUBLICATIONS

    Copyright Notice

      The documents contained in these directories are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's or organization's copyright.

Publications

  • Book Chapters

      Nevena Vratonjic, Mohammad Hossein Manshaei, Jens Grossklags, Jean-Pierre Hubaux (2013) Ad-blocking Games: Monetizing Online Content Under the Threat of Ad Avoidance, in: R. Böhme (Ed.), "The Economics of Information Security and Privacy," Springer Verlag, pp. 49-73. ISBN: 978-3-642-39497-3.

      Jens Grossklags, Benjamin Johnson and Nicolas Christin (2010) The Price of Uncertainty in Security Games, in: T. Moore, D. Pym, and C. Ioannidis (Eds.), "Economics of Information Security and Privacy," Springer Verlag, pp. 9-32. ISBN: 978-1-4419-6966-8. Lead article.

      Nicolas Christin, John Chuang and Jens Grossklags (2008) Economics-informed design of Content delivery Networks, in: R. Buyya, A.K. Pathan, A. Vakali (Eds.) "Content Delivery Networks: Principles and Paradigms," Springer Verlag, pp. 183-210. ISBN: 978-3-540-77886-8.

      Alessandro Acquisti and Jens Grossklags (2007) What can behavioral economics teach us about privacy?, in: A. Acquisti, S. Gritzalis, S. Di Vimercati, C. Lambrinoudakis (Eds.), "Digital Privacy: Theory, Technologies, and Practices," Auerbach Publications, pp. 363-379. ISBN: 1420052179. [Content of book]

      Nathan Good, Rachna Dhamija, Jens Grossklags, Steven Aronovitz, David Thaw, Deirdre Mulligan and Joseph Konstan (2007) Stopping Spyware at the Gate: A User Study of Privacy, Notice and Spyware, in "Spyware - An Insight," Icfai University Press, Andhra Pradesh, India, pp. 81-109. Reprint of conference publication. ISBN: 81-314-0726-8.

      Alessandro Acquisti and Jens Grossklags (2005) Privacy and Rationality: Theory and Evidence, in: K. Strandburg and D.S. Raicu (Eds.), "Privacy and Technologies of Identity: A Cross-Disciplinary Conversation," Springer, pp. 15-29. ISBN: 0387260501. [Content of book]

      Alessandro Acquisti and Jens Grossklags (2004) Privacy Attitudes and Privacy Behavior: Losses, Gains, and Hyperbolic Discounting, in: Jean Camp and Stephen Lewis (Eds.) "The Economics of Information Security," Kluwer Academic Publishers, Boston/Dordrecht/London, pp. 165-178. ISBN: 978-1-4020-8089-0. [Content of book]

  • Public Policy: Publications, Testimonies, Panel Participations, and Talks

      Jens Grossklags (2011) Technical Plenary Speaker and Panelist on The Web Privacy Tussle: Privacy and the User, IETF 81 Meeting, Internet Engineering Task Force (IETF), Quebec City, Canada, July 24-29, 2011. Invited and hosted by the Internet Architecture Board (IAB). [Slides]

      Jens Grossklags (2011) Invited Expert and Presenter on Security Economics, DARPA ISAT Study on Macroeconomics, Game Theory and Security, Defense Advanced Research Projects Agency (DARPA), Information Science and Technology Study Group (ISAT). Meetings held January 12-13, 2011, at MIT; January 24-25 at SRI International; and June 16-17 at System Planning Corporation. [Materials are not public.]

      Jens Grossklags (2010) Presenter and Panelist on Economics of Security, NSF Workshop on the Future of Trustworthy Computing, National Science Foundation, Arlington, VA, October 27-29, 2010. [Slides] [Workshop Report]

      Jens Grossklags (2009) Invited Expert on Cyber Economics, National Cyber Leap Year Summit 2009, Subcommittee on Networking and Information Technology Research and Development (NITRD), National Science and Technology Council (NSTC), Arlington, VA, August 17-19, 2009. [Co-Chairs' Report] [Participants' Ideas Report]

      Jens Grossklags, Deirdre Mulligan, Chris Jay Hoofnagle, Maryanne McCormick, and Nathaniel Good (2007) Negative Options and the Limits of Notice, Presentation and Panel Participation at Negative Options: FTC Workshop Analyzing Negative Option Marketing, Federal Trade Commission (FTC), Washington D.C., January 25, 2007. [Slides] [Additional Comments] [FTC staff report frequently citing our research]

      Joe Turow, Chris Jay Hoofnagle, Deirdre Mulligan, Nathan Good, and Jens Grossklags (2006) Consumers & Privacy In the Coming Decade, Session on Communicating with Consumers in the Next Tech-ade - The Impact of Demographics and Shifting Consumer Attitudes, Public Hearings on Protecting Consumers in the Next Tech-ade, Federal Trade Commission (FTC), Washington D.C., November 6 - 8, 2006. (presented by Joe Turow and Chris Hoofnagle) [Slides] [FTC Commissioner Leibowitz citing report] [FTC Staff report citing presentation by Chris Hoofnagle]

      Nathan Good and Jens Grossklags (2006) HCI and Public Policy: Making Usable Law and Technology, Workshop on Public Policy, Conference on Human Factors in Computing Systems (CHI 2006), Montreal, Canada, April 22-27, 2006.

  • Conference Proceedings

      Benjamin Johnson, Aron Laszka, and Jens Grossklags (2014) How Many Down? Toward Understanding Systematic Risk in Networks, in: 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014), Kyoto, Japan, June 4-6, 2014. (Acceptance Rate = 20.0%)

      Aron Laszka, Benjamin Johnson, Jens Grossklags, and Mark Felegyhazi (2014) Estimating Systematic Risk in Real-World Networks, in: Proceedings of the Eighteenth International Conference on Financial Cryptography and Data Security (FC'14), Christ Church, Barbados, March 3-7, 2014. (Acceptance Rate = 22.5%)

      Benjamin Johnson, Aron Laszka, Jens Grossklags, Marie Vasek, and Tyler Moore (2014) Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools, in: First Workshop on Bitcoin Research. Proceedings of the Eighteenth International Conference on Financial Cryptography and Data Security (FC'14), Christ Church, Barbados, March 3-7, 2014.

      Aron Laszka, Benjamin Johnson, and Jens Grossklags (2013) Mitigating Covert Compromises: A Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks, in: Proceedings of the 9th Conference on Web and Internet Economics (WINE), Cambridge, MA, December 11-14, 2013. (Acceptance Rate = 24%)

      Rainer Böhme and Jens Grossklags (2013) Trading Agent Kills Market Information: Evidence from Online Social Lending, in: Proceedings of the 9th Conference on Web and Internet Economics (WINE), Cambridge, MA, December 11-14, 2013. (Acceptance Rate = 24%)

      Alan Nochenson, Jens Grossklags, and Kathryn Lambert (2013) Conducting an Internet Measurement Project in an Interdisciplinary Class Context: A Case Study, in: Proceedings of the 6th International Conference of Education, Research and Innovation (ICERI), Seville, Spain, November 18-20, 2013.

      Aron Laszka, Benjamin Johnson, and Jens Grossklags (2013) Mitigation of Targeted and Non-Targeted Covert Attacks as a Timing Game, in: Proceedings of the Fourth Conference on Decision and Game Theory for Security (GameSec 2013), Fort Worth, TX, November 11-12, 2013.

      Pascal Schöttle, Benjamin Johnson, Aron Laszka, Jens Grossklags, and Rainer Böhme (2013) Bitspotting: Detecting Optimal Adaptive Steganography, in: Proceedings of the 12th International Workshop on Digital-Forensics and Watermarking (IWDW), Auckland, New Zealand, October 1-4, 2013.

      Aron Laszka, Benjamin Johnson, Pascal Schöttle, Jens Grossklags, and Rainer Böhme (2013) Managing the Weakest Link: A Game-Theoretic Approach for the Mitigation of Insider Threats, in: Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS), Egham, UK, September 9-13, 2013. (Acceptance Rate < 18%)

      Pascal Schöttle, Benjamin Johnson, Aron Laszka, Jens Grossklags, and Rainer Böhme (2013) A Game-Theoretic Analysis of Content-Adaptive Steganography with Independent Embedding, in: Proceedings of the 21st European Signal Processing Conference (EUSIPCO), Marrakech, Marocco, September 9-13, 2013.

      David Reitter, Jens Grossklags, and Alan Nochenson (2013) Risk-Seeking in a Continuous Game of Timing, in: Proceedings of the 13th International Conference on Cognitive Modeling (ICCM), Ottawa, Canada, July 11-14, 2013.

      Alan Nochenson and Jens Grossklags (2013) A Behavioral Investigation of the FlipIt Game, in: Proceedings of the 12th Workshop on the Economics of Information Security (WEIS), Washington DC, June 11-12, 2013.

      Na Wang, Jens Grossklags, and Heng Xu (2013) An Online Experiment of Privacy Authorization Dialogues for Social Applications, in: Proceedings of the 16th ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW 2013), San Antonio, Texas, February 23-27, 2013, 261-272.

      Heng Xu, Na Wang, and Jens Grossklags (2012) Privacy by ReDesign: Alleviating Privacy Concerns for Third-Party Apps, in: Proceedings of the International Conference on Information Systems (ICIS 2012), Orlando, FL, December 16-19, 2012.

      Nevena Vratonjic, Mohammad Hossein Manshaei, Jens Grossklags, Jean-Pierre Hubaux (2012) Ad-blocking Games: Monetizing Online Content Under the Threat of Ad Avoidance, Eleventh Workshop on the Economics of Information Security (WEIS 2012), Berlin, Germany, June 25-26, 2012.

      Benjamin Johnson, John Chuang, Jens Grossklags, and Nicolas Christin (2012) Metrics for Measuring ISP Badness: The Case of Spam, in: Proceedings of the Sixteenth International Conference on Financial Cryptography and Data Security (FC'12), Kralendijk, Bonaire, February 27 - March 2, 2012, pp. 89-97.

      Benjamin Johnson, Rainer Böhme, and Jens Grossklags (2011) Security Games with Market Insurance, in: Proceedings of the Second Conference on Decision and Game Theory for Security (GameSec 2011), College Park, MD, November 14-15, 2011, pp. 117-130.

      Na Wang, Heng Xu, and Jens Grossklags (2011) Third-Party Apps on Facebook: Privacy and the Illusion of Control, in: Proceedings of the ACM Symposium on Computer Human Interaction for Management of Information Technology (CHIMIT), Boston, MA, December 4-5, 2011.

      Rainer Böhme and Jens Grossklags (2011) The Security Cost of Cheap User Interaction, in: Proceedings of the New Security Paradigms Workshop (NSPW), Marin County, CA, September 12-15, 2011, pp. 67-82. (Paper Acceptance Rate: 38%)

      Jens Grossklags, Lora Appel, and Frank Bridges (2011) Young adults and online political participation: Search strategies and the role of social media, in: Proceedings of the 12th International Digital Government Research Conference (dg.o 2011), College Park, MD, June 12-15, 2011, pp. 302-306.

      Rainer Böhme and Jens Grossklags (2011) Vanishing Signals: Trading Agent Kills Market Information (Evidence from a Natural Experiment in Online Social Lending), in: Proceedings of the 6th Workshop on the Economics of Networks, Systems and Computation (NetEcon), San Jose, CA, June 6, 2011. (Paper acceptance rate: 35.0%)

      Benjamin Johnson, Jens Grossklags, Nicolas Christin, and John Chuang (2011) Nash Equilibria for Weakest Target Security Games with Heterogeneous Agents, to appear in: Proceedings of the 2nd International ICST Conference on Game Theory for Networks (GameNets 2011), Shanghai, China. April 16-18, 2011.

      Nicolas Christin, Serge Egelman, Timothy Vidas, and Jens Grossklags (2011) It's all about the Benjamins: An empirical study on incentivizing users to ignore security advice, in: Proceedings of the Fifteenth International Conference on Financial Cryptography and Data Security (FC'11), Gros Islet, St. Lucia, February 28 - March 4, 2011, pp. 16-30. (Paper Acceptance Rate: 20%)

      Benjamin Johnson, Jens Grossklags, Nicolas Christin, and John Chuang (2010) Uncertainty in Interdependent Security Games, in: Proceedings of the First Conference on Decision and Game Theory for Security (GameSec 2010), Berlin, Germany, November 22-23, pp. 234-244. (Paper Acceptance Rate: 33%)

      Benjamin Johnson, Jens Grossklags, Nicolas Christin and John Chuang (2010) Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information, in: Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS), September 20-22, 2010, Athens, Greece, pp. 588-606. (Paper acceptance rate: 20.8%)

      Jens Grossklags, Svetlana Radosavac, Alvaro Cárdenas and John Chuang (2010) Nudge: Intermediaries' Role in Interdependent Network Security, in: Proceedings of the Third International Conference on Trust and Trustworthy Computing (TRUST 2010), June 21-23, 2010, Berlin, Germany. Published in: Alessandro Acquisti, Sean Smith, and Ahmad-Reza Sadeghi (Eds.), Lecture Notes in Computer Science (LNCS), No. 6101, Springer Verlag, Heidelberg, Germany, 2010, pp. 323-336.

      Jens Grossklags, Benjamin Johnson and Nicolas Christin (2010) When information improves information security, in: Proceedings of the Fourteenth International Conference Financial Cryptography and Data Security (FC'10), January 25-28, 2010, Tenerife, Spain. Published in: Radu Sion (Ed.), Lecture Notes in Computer Science (LNCS), No. 6052, Springer Verlag, 2010, pp. 416-423. (Paper acceptance rate: 26%) Extended version available as CyLab Technical Report, CMU, No. CMU-CyLab-09-004.

      Jens Grossklags, Benjamin Johnson and Nicolas Christin (2009) The Price of Uncertainty in Security Games, Eighth Workshop on the Economics of Information Security (WEIS 2009), London, UK, June 24-25, 2009.

      Jens Grossklags and Benjamin Johnson (2009) Uncertainty in the Weakest-link security game, in: Proceedings of the International Conference on Game Theory for Networks (GameNets 2009), May 13-15, 2009, Istanbul, Turkey, pp. 673-682. Proceedings published by IEEE. ISBN: 978-1-4244-4176-1.

      Neal Fultz and Jens Grossklags (2009) Blue versus Red: Towards a model of distributed security attacks, in: Proceedings of the Thirteenth International Conference Financial Cryptography and Data Security (FC'09), February 23 - 26, 2009, Christ Church, Barbados. Published in: Roger Dingledine, Philippe Golle (Eds.), Lecture Notes in Computer Science (LNCS), No. 5628, Springer Verlag, 2009, pp. 167-183. ISBN: 978-3-642-03548-7. (Paper acceptance rate: 23%)

      Jens Grossklags, Nicolas Christin and John Chuang (2008) Security and insurance management in networks with heterogeneous agents, in: Proceedings of the 9th ACM Conference on Electronic Commerce (EC'08), Chicago, IL, July 8 - 12, 2008, pp. 160-169. (Paper acceptance rate: 19%)

      Jens Grossklags, Nicolas Christin and John Chuang (2008) Secure or insure? A game-theoretic analysis of information security games, in: Proceedings of the 17th International World Wide Web Conference (WWW2008), Internet Monetization track, Beijing, China, April 21 - 25, 2008, pp. 209-218. (Paper Acceptance Rate: 11%; full paper)

      Jens Grossklags, Nicolas Christin and John Chuang (2008) Predicted and observed user behavior in the weakest-link security game, in: Proceedings of the 2008 USENIX Workshop on Usability, Psychology, and Security (UPSEC'08). San Francisco, CA. April 14, 2008.

      Jens Grossklags and Alessandro Acquisti (2007) When 25 Cents is too much: An Experiment on Willingness-To-Sell and Willingness-To-Protect Personal Information, Sixth Workshop on the Economics of Information Security (WEIS 2007), Pittsburgh, PA, June 7- 8, 2007.

      Jens Grossklags (2007) Experimental Economics and Experimental Computer Science: A Survey, Workshop on Experimental Computer Science (ExpCS'07), ACM Federated Computer Research Conference (FCRC), San Diego, CA, June 13-14. 2007. ISBN: 978-1-59593-751-3.

      Nathan Good, Jens Grossklags, Deirdre Mulligan, and Joe Konstan (2007) Noticing Notice: A large-scale experiment on the timing of software license agreements, in: Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI'07), San Jose, CA, April 28 - May 3, 2007, pp. 607-616. ISBN: 978-1-59593-593-9. (Paper Acceptance Rate = 25%)

      Jens Grossklags and Nathan Good (2007) Empirical Studies on Software Notices to Inform Policy Makers and Usability Designers, presented at: Usable Security (USEC'07), Lowlands, Scarborough, Trinidad/Tobago, February 15-16, 2007. Published in: Proceedings of the Eleventh International Conference Financial Cryptography and Data Security (FC'07), Lecture Notes in Computer Science (LNCS), No. 4886, Springer Verlag, 2008, pp. 341-355. ISBN: 978-3-540-77365-8.

      Nathan Good, Rachna Dhamija, Jens Grossklags, Steven Aronovitz, David Thaw, Deirdre Mulligan and Joseph Konstan (2005) Stopping Spyware at the Gate: A User Study of Privacy, Notice and Spyware, in Proceedings of the Symposium On Usable Privacy and Security (SOUPS 2005), Pittsburgh, PA, July 6-8, 2005, pp. 43-52. ISBN: 1-59593-178-3. (Paper Acceptance Rate = 26%)

      Alessandro Acquisti and Jens Grossklags (2005) Uncertainty, Ambiguity and Privacy, presented at the Fourth Annual Workshop Economics and Information Security (WEIS 2005), Boston, MA, June 2-3, 2005.

      Nicolas Christin, Jens Grossklags and John Chuang (2004) Near rationality and competitive equilibria in networked systems, in: Proceedings of the SIGCOMM Workshop on Practice and Theory of Incentives in Networked Systems (PINS), ACM SIGCOMM 2004, Portland, OR, August 30 - September 3, 2004, pp. 213-219. ISBN: 1-58113-942-X. (Paper Acceptance Rate = 25%)

      Alessandro Acquisti and Jens Grossklags (2004) Privacy and Rationality: Preliminary Evidence from Pilot Data , in: Proceedings (online) of the Third Annual Workshop Economics and Information Security (WEIS 2004), University of Minnesota, Minnesota, US, May 13-14, 2004.

      Jens Grossklags and Carsten Schmidt (2003) Artificial Software Agents on Thin Double Auction Markets: A Human Trader Experiment, in: Proceedings of the 2003 IEEE/WIC International Conference on Intelligent Agent Technology (IAT-2003), IEEE Computer Society, Halifax, Canada, October 13-17, 2003, pp. 400-407. ISBN: 0-7695-1931-8. (Paper Acceptance Rate = 23%)

      Jens Grossklags and Carsten Schmidt (2003) Interaction of Human Traders and Artificial Agents on Double Auction Markets: Simulations and Laboratory Experiments, Invited Paper and Presentation for the Third International Workshop on Computational Intelligence in Economics and Finance (CIEF 2003), 7th Joint Conference on Information Sciences, Cary, North Carolina, US, September 26-30, 2003, pp. 1269-1272. ISBN: 0-9707890-2-5.

      Alessandro Acquisti and Jens Grossklags (2003) An Experimental Approach to Information Security Attitudes and Behavior, in: Proceedings of the Second Annual Workshop Economics and Information Security (WEIS 2003), College Park, Maryland, US, May 29-30, 2003.

      Abhishek Ghose, Jens Grossklags and John Chuang (2003) Resilient Data-Centric Storage in Wireless Ad-Hoc Sensor Networks, in: Proceedings of the 4th International Conference on Mobile Data Management (MDM2003), sponsored by ACM SIGMOD, ACM SIGMOBILE and the Australian Computer Society/ACS, Melbourne, Australia. M.-S.Chen, P.K.Chrysanthis, M.Sloman, A.Zaslavsky (Eds.) "Mobile Data Management", Springer LNCS series, No. 2574, pp. 45-62. ISBN: 3-540-00393-2. BEST PAPER AWARD

      Sarah Spiekermann, Jens Grossklags and Bettina Berendt (2001) E-privacy in 2nd generation E-Commerce: privacy preferences versus actual behavior, in: Proceedings of the Third ACM Conference on Electronic Commerce, Association for Computing Machinery (ACM EC'01), Tampa, Florida, US, pp. 38-47. ISBN: 1-58113-387-1. (Paper Acceptance Rate < 20%)

      Sarah Spiekermann, Jens Grossklags, Bettina Berendt (2001) Stated Privacy Preferences versus Actual Behaviour in EC environments: a Reality Check, in: Proceedings of the 5th International Conference Wirtschaftsinformatik (Business Informatics) - 3rd Conference Information Systems in Finance (WI-IF 2001), Augsburg, Germany. H.U. Buhl, N. Kreyer, W. Steck (Eds.) "e-Finance: Innovative Problemlösungen für Informationssysteme in der Finanzwirtschaft", Springer, pp. 129-148. ISBN: 3-540-42385-0. BEST PAPER AWARD

      Jens Grossklags, Carsten Schmidt and Jonathan Siegel (2000) Dumb software agents on experimental electronic markets in: Gesellschaft für Informatik e.V. (eds.), Informatiktage 2000, Konradin Verlag, Leinfelden-Echterdingen, Germany. ISBN: 3-920560-16-7.

  • Conference and Workshop Presentations and Abstracts

      Jens Grossklags, Svetlana Radosavac, Alvaro A. Cardenas, and John Chuang (2010) Nudge: Intermediaries Role in Interdependent Network Security, Poster presentation and extended abstract at the 25th ACM Symposium on Applied Computing (SAC), Track on Information Security Research and Applications, Sierre, Switzerland, March 22-26, 2010, pp. 1879-1880.

      Alvaro A. Cardenas, Svetlana Radosavac, Jens Grossklags, John Chuang, and Chris Hoofnagle (2009) An Economic Map of Cybercrime, Presentation at the 37th Research Conference on Communication, Information and Internet Policy (TPRC), Arlington, VA, September 25-27, 2009.

      Jens Grossklags (2007) Privacy, Incentives, & Contractual Efficiency in the Market for Consumer Software, Presentation at the DIMACS Workshop on Information Security Economics, Center for Discrete Mathematics & Theoretical Computer Science (DIMACS), New Jersey, January 18-19, 2007.

      Jens Grossklags (2006) Privacy, Incentives, & Contractual Efficiency in the Market for Consumer Software, Presentation at the XV International Tor Vergata Conference on Banking and Finance "Money, Finance and Growth", Rome, Italy, December 13-15, 2006.

      Alessandro Acquisti and Jens Grossklags (2006) What can behavioral economics teach us about privacy? Presentation at the International Conference on Emerging Trends in Information and Communication Security (ETRICS 2006), Freiburg, Germany, June 6-9, 2006. Working paper available from authors. Keynote lecture. (presented by Alessandro Acquisti)

      Alessandro Acquisti and Jens Grossklags (2005) Privacy and Ambiguity Presentation at the Annual Meeting of the Canadian Law and Economics Association, Toronto, Canada, September 23 - 24, 2005. (presented by Alessandro Acquisti)

      Nathan Good, Rachna Dhamija, Jens Grossklags et al. (2005) A User Study of Spyware Presentation and panel discussion on "Regulatory Challenges" at Spyware: The latest Cyber-Regulatory Challenge at the Berkeley Center for Law and Technology, Berkeley, California, April 1, 2005 (presented by Deirdre Mulligan)

      Alesssandro Acquisti and Jens Grossklags (2004) Privacy and Rationality: Evidence from Survey Data, presented at Privacy and Identity: The Promise and Perils of a Technological Age, 2004 CIPLIT Symposium, Chicago, Illinois, October 14-15, 2004.

      Jens Grossklags and Carsten Schmidt (2003) Artificial Software Agents on Thin Markets: A Human Trader Experiment, presented at the 2003 International Meeting of the Economic Science Association, Pittsburgh, Pennsylvania, US, June 19-22, 2003.

        Also presented at the Annual Meeting of the GEW, Lutherstadt Wittenberg, Germany, July 11-13, 2002.
        Also presented at the Invitational Workshop of the Strategic Interaction Unit, Max-Planck Institute for Research into Economic Systems, Jena, Germany, July 26-28, 2002.
        Also presented at INFORMS Annual Meeting 2002, Financial Markets Session, San Jose, California, US, program abstract p. 101, November 17-20, 2002.
        Also presented at the Second Lake Arrowhead Conference on Human Complex Systems, Los Angeles, California, US, March 19-23, 2003.

      Abhishek Ghose, Jens Grossklags and John Chuang (2002) Resilient Data-Centric Storage in Wireless Ad-Hoc Sensor Networks, presented at INFORMS Annual Meeting 2002, Telecommunication Networks Session, San Jose, US, program abstract p. 72.

      Jens Grossklags (2002) On the Benefit of Behavioral Privacy Experiments in Commercial Ubiquitous Computing Environments, presentation given at the Workshop on Socially-informed Design of Privacy-enhancing Solutions in Ubiquitous Computing, ACM Ubicomp Conference'02, Gothenburg, Sweden.

      Jens Grossklags, Carsten Schmidt and Jonathan Siegel (2001) Software agents on an experimental asset market, presented at the INFORMS Annual Meeting 2001 (primary conference of the OR/MS community), E-Business and XML Session, Miami Beach, US, program abstract p. 90.

  • Unpublished Working Papers

      Jens Grossklags and Bettina Berendt (2001) How can Semantic Web Mining be used to protect online privacy?, working paper.

       

  • Professional Activities
    • Program Chair, Third Conference on Decision and Game Theory for Security (GameSec 2012), November 5-6, 2012, Budapest, Hungary. (Co-Chair: Jean Walrand, UC Berkeley)

      Co-Organizer, Panel on Software Download Basics, held at Computers, Freedom and Privacy (CFP07), May 4, 2007, Montreal, Canada (with Nathaniel Good), Speakers: Jens Grossklags, Alissa Cooper, Colin O'Malley, David Fewer

      Co-Organizer workshop on UbiComp Privacy: Privacy in Context, held at ACM UbiComp 2005, September 11, 2005, Tokyo, Japan (co-chaired with Alessandro Acquisti, John Canny, Jason Hong, Marc Langheinrich, Scott Mainwaring) [Website]

      Co-Organizer workshop on UbiComp communities: privacy as boundary negotiation, held at ACM UbiComp 2003, October 12, 2003, Seattle, Washington, USA (co-chaired with John Canny, Paul Dourish, Scott Mainwaring, Xiaodong Jiang) [Website]

      Program Committee Member:

      • Internet of Things 2012 Conference (IoT 2012), Wuxi, China
      • Tenth International Conference on Pervasive Computing (Pervasive 2012), Newcastle, UK
      • The Eleventh Workshop on the Economics of Information Security (WEIS 2012), Berlin, Germany
      • Conference on Decision and Game Theory for Security (GameSec 2011), College Park, MD
      • Ninth International Conference on Pervasive Computing (Pervasive 2011), San Francisco, CA
      • The Tenth Workshop on the Economics of Information Security (WEIS 2011), Washington, D.C.
      • Internet of Things 2010 Conference (IoT 2010), Tokyo, Japan
      • Conference on Decision and Game Theory for Security (GameSec 2010), Berlin, Germany
      • The Ninth Workshop on the Economics of Information Security (WEIS 2010), Cambridge, MA
      • ACM Symposium On Applied Computing 2010 (SAC 2010), Track: Information security research and applications, Sierre, Switzerland
      • Workshop in UbiComp Privacy: Technologies, Users, Policy, at UbiComp 2007, Innsbruck, Austria [Website]
      • The Sixth Workshop on the Economics of Information Security (WEIS 2007), Hanover, NH
      • Workshop on Security and Privacy in Future Business Services, International Conference on Emerging Trends in Information and Communication Security (Etrics 2006), Freiburg, Germany
      • International Workshop on Location- and Context-Awareness (LoCA), in cooperation with Pervasive 2005, Oberpfaffenhofen, Germany

      Journal Reviewer:

      • ACM Computing Surveys
      • ACM Transactions on Information and System Security
      • ACM Transactions on Intelligent Systems and Technology
      • ACM Transactions on Internet Technology
      • Decision Analysis
      • Decision Support Systems
      • Economic Inquiry
      • Ethics and Information Technology
      • IEEE Journal on Selected Areas in Communications
      • IEEE Pervasive Computing
      • IEEE Security and Privacy
      • IEEE Transactions on Information Forensics and Security
      • IEEE Transactions on Parallel and Distributed Systems
      • Information Systems Frontiers
      • Information Systems Research
      • INFORMS Journal on Computing
      • Journal of the Utah Academy of Sciences, Arts, and Letters
      • Management Science
      • Personal and Ubiquitous Computing

      Conferences & Workshops:

      • First & Second Workshop on Economics of Peer-to-Peer Systems; 5th International Conference Wirtschaftsinformatik (Business Informatics), IEEE CEC 2005, WWW2008, USENIX UPSEC 2008, ICIS 2008, ICEC 2009, ACM UBICOMP 2009, ICIS 2009, INFOCOM 2009, CHI 2009, INFOCOM 2010, CHI 2010, ICIS 2010, ICIS 2011, WI 2011, CHI 2012, ICIS 2012, iConference 2012

  • Selected Talks, Guest Lectures and Panel Participations
    • Users and Privacy: The Web Privacy Tussle, Presentation at the School of Computer and Communication Sciences, Swiss Federal Institute of Technology (EPFL), Lausanne, Switzerland, August 2011.

      Social Status and the Demand for Security and Privacy, Presentation at the School of Computer and Communication Sciences, Swiss Federal Institute of Technology (EPFL), Lausanne, Switzerland, May 2011.

      Social Status and the Demand for Security and Privacy, Presentation at the Center for Research on Computation and Society (CRCS) and the Berkman Center for Internet and Society, Harvard University, Cambridge, MA, April 2011.

      Secure or Insure? An Economic Analysis of Security Interdependencies and Investment Types, Presentation at Information Networking Institute & CyLab, Carnegie Mellon University, Pittsburgh, PA, March 2010.

      Secure or Insure? An Economic Analysis of Security Interdependencies and Investment Types, Presentation at the Department of Information Systems, HEC Lausanne, University of Lausanne, Lausanne, Switzerland, March 2010.

      Secure or Insure? An Economic Analysis of Security Interdependencies and Investment Types, Presentation at the School of Computer and Communication Sciences, Swiss Federal Institute of Technology (EPFL), Lausanne, Switzerland, March 2010.

      Secure or Insure? An Economic Analysis of Security Interdependencies and Investment Types, Presentation at the College of Information Sciences and Technology, The Pennsylvania State University (University Park), State College, PA, March 2010.

      Secure or Insure? An Economic Analysis of Security Interdependencies and Investment Types, Presentation at the Faculty of Computing and Information Science, Cornell University, Ithaca, NY, March 2010.

      Secure or Insure? An Economic Analysis of Security Interdependencies and Investment Types, Presentation at the College of Information Science and Technology, Drexel University, Philadelphia, PA, March 2010.

      Reveal or conceal? Learning from Economic and Behavioral Studies on Consumer Privacy, Presentation at the School of Communication, Information and Library Studies, Rutgers University, New Brunswick, NJ, March 2010.

      Privacy, Notice and Incentives in the Market for Consumer Software, Presentation at the Department of Computer Science, Technical University Dresden, Dresden, Germany, January 2010.

      Secure or Insure? An Economic Analysis of Security Interdependencies and Investment Types, Presentation at the Interdisciplinary Telecommunications Program & Department of Computer Science, University of Colorado, Boulder, December 2009.

      Privacy, Notice and Incentives in the Market for Consumer Software, Presentation at the Center for Information Technology Policy, Princeton University, Princeton, NJ, October 2009.

      (Non-)Economic incentives in the marketplace, Guest Lecture in ``Crowdsourcing your experiment,'' Computer Science Department, Princeton University, Princeton, NJ, October 2009.

      Secure or Insure? Security investment (failures) in five economic environments, Presentation at the School of Information, UC Berkeley, Berkeley, CA, May 2009.

      Secure or Insure? Security investment (failures) in five economic environments, Presentation at the Center for Information Technology Policy, Princeton University, Princeton, NJ, April 2009.

      Secure or Insure? Security investment (failures) in five economic environments, Presentation at the Woodrow Wilson School of Public and International Affairs, Princeton University, Princeton, NJ, April 2009.

      Panel on "Economics of Information Security - Opportunities and Challenges as the Field Matures," Thirteenth International Conference Financial Cryptography and Data Security '09, Christ Church, Barbados, February 2009.

      Secure or Insure? Security investment (failures) in five economic environments, Presentation at the School of Information, University of Michigan, Ann Arbor, MI, February 2009.

      Secure or Insure? Security investment (failures) in five economic environments, Presentation at the DOCOMO Communications Laboratories USA, Palo Alto, CA, November 2008.

      Secure or Insure? Security investment (failures) in five economic environments, Presentation at the Network Theory and Communications research group seminar, École Normale Supérieure, Paris, France, July 2008.

      Secure or Insure? Analyzing network security games, Presentation at CyLab Japan, Carnegie Mellon University, Kobe, Japan, April 2008.

      Secure or insure? A game-theoretic analysis of information security games, Presentation at the CSL Colloquium, PARC, Palo Alto, CA, January 2008.

      Economics, public policy and security and privacy research, Guest lecture in 'Privacy and Security Enhancing Technologies', Computer Science Department, UC Berkeley, November 2007.

      The economics of revealing and protecting private information: Evidence from human subject experiments and surveys, Presentation at the Computer Laboratory Security Seminar, University of Cambridge, UK, July 2007. [Abstract]

      Panel on "Notice and Choice", Privacy Workshop, Berkeley Center for Law and Technology (BCLT), Berkeley, CA, June 2007.

      Negative Options and the Limits of Notice, Presentation at TRUSTe, San Francisco, CA, 2007.

      Stopping Spyware at the Gate: A User Study of Privacy, Notice and Spyware, Presentation at the Samuelson Law, Technology & Public Policy Clinic Seminar, Boalt School of Law, UCB, Berkeley, 2005.

      Empirical Research Projects on the Topics of Privacy and Information Security, Presentation at the Helsinki Institute for Information Technology (HIIT), Helsinki, June 2004.

      Wireless Sensor Networks, Guest Lecture in 'Computer-Based Communications Systems and Networks', SIMS, UC Berkeley, 2003.

      Artificial Software Agents on Thin Double Auction Markets: A Human Trader Experiment, Presentation at the Computational Colloquium, The Anderson Business School, UCLA, 2003.

      Online Privacy - An Experiment, Presentation at Experimental Research Workshop, Hewlett Packard Laboratories, Palo Alto, 2002.

      Panel on "Privacy and Economics", Workshop on Socially-informed Design of Privacy-enhancing Solutions in Ubiquitous Computing, ACM Ubicomp 2002, Gothenborg, Sweden, 2002.

      Artificial Software Agents on Thin Markets: A Human Trader Experiment, Presentation at MERSS, National Research Center 504, Mannheim, 2002.

      E-privacy in 2nd generation E-Commerce, Presentation at the SIMS Research Seminar, University of California, Berkeley, 2001.

      B2B Electronic Commerce, Presentation at DeTeWe headquarters, Berlin, 2000.

      Software Agents on Experimental Electronic Markets, Presentation at the Institute of Information Systems Seminar, Humboldt University, Berlin, 2000.

    Back to main index