Get my own profile
Public access
View all22 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Benjamin JohnsonUniversity of California, BerkeleyVerified email at ischool.berkeley.edu
Aron LaszkaAssistant Professor, University of HoustonVerified email at uh.edu
John ChuangProfessor, UC Berkeley School of InformationVerified email at ischool.berkeley.edu
Alessandro AcquistiCarnegie Mellon UniversityVerified email at andrew.cmu.edu
Nicolas ChristinAssociate Professor, Carnegie Mellon UniversityVerified email at andrew.cmu.edu
Nathan GoodGood ResearchVerified email at goodresearch.com
Rainer BöhmeUniversität Innsbruck, AustriaVerified email at uibk.ac.at
Mingyi ZhaoSnap Inc.Verified email at snap.com
Deirdre K. MulliganUC BerkeleyVerified email at berkeley.edu
Sadegh FarhangPennsylvania State UniversityVerified email at ist.psu.edu
Sarah SpiekermannVienna University of Economics and Business - Wirtschaftsuniversität Wien (WU)Verified email at wu.ac.at
Heng XuProfessor of Information Technology and Analytics, Kogod School of Business, American UniversityVerified email at american.edu
Na WangPh.D., AWSVerified email at amazon.com
Yu PuPh.D. Student in Pennsylvania State UniversityVerified email at ist.psu.edu
Jake WeidmanGoogleVerified email at google.com
Chris Jay HoofnagleUniversity of California, Berkeley School of Law, School of InformationVerified email at berkeley.edu
Joseph A. KonstanUniversity of MinnesotaVerified email at umn.edu
David ThawAssociate Professor, University of PittsburghVerified email at pitt.edu
Paul MunteanChair for IT Security, Technical University of MunichVerified email at sec.in.tum.de
Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
Jens Grossklags
Chair for Cyber Trust, Technical University of Munich
Verified email at in.tum.de - Homepage