Wolter Pieters

dr.ir.

20012018

Research output per year

If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Wolter Pieters is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 2 Similar Profiles

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output

On the anatomy of social engineering attacks: A literature-based dissection of successful attacks

Bullée, J-W. H., Montoya, L., Pieters, W., Junger, M. & Hartel, P., Jan 2018, In : Journal of Investigative Psychology and Offender Profiling. 15, 1, p. 20-45 26 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
  • 4 Citations (Scopus)
    69 Downloads (Pure)

    Adversarial risks in social experiments with new technologies

    Pieters, W. & Dechesne, F., 2017, Experimentation beyond the laboratory: new perspectives on technology. van der Poel, I., Asveld, L. & Mehos, D. C. (eds.). Oxford, UK: Routledge

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

  • Cybersecurity as a Politikum: Implications of Security Discourses for Infrastructures

    Fichtner, L., Pieters, W. & Texeira, A., Sep 2016, NSPW '16: Proceedings of the 2016 New Security Paradigms Workshop. New York, NY: Association for Computing Machinery (ACM), p. 36-48

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
  • 6 Citations (Scopus)
    32 Downloads (Pure)

    Integrated Safety and Security Risk Assessment Methods: A Survey of Key Characteristics and Applications

    Chockalingam, S., Hadziosmanovic, D., Pieters, W., Texeira, A. & van Gelder, P., Oct 2016, Critical Information Infrastructures Security: 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers. Havarneanu, G., Setola, R., Nassopoulos, H. & Wolthusen, S. (eds.). Cham: Springer, p. - (Lecture Notes in Computer Science; vol. 10242)(Security and Cryptology).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
  • Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace

    Pieters, W., Hadžiosmanović, D. & Dechesne, F., Jun 2016, In : Science and engineering ethics. 22, 3, p. 831-850 20 p.

    Research output: Contribution to journalArticleAcademicpeer-review

    Open Access
    File
  • 5 Citations (Scopus)
    53 Downloads (Pure)