Search concepts
|
Selected filters |
- 1 - 50 out of 61 results
- Export search results
Search results
-
Article
A cross-national study of direct and indirect effects of cyberbullying on cybergrooming victimization via self-esteem
Wachs, S., Jiskrova, G. K., Vazsonyi, A. T., Wolf, K. D. & Junger, M., 2 Mar 2016, In : Psicologia educativa. 22, 1, p. 61-70Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile21 Citations (Scopus)97 Downloads (Pure) -
Clustering of health and risk behaviour in immigrant and indigenous Dutch residents aged 19-40 years.
Reijneveld, S. A., van Nieuwenhuijzen, M., Klein Velderman, M., Paulussen, T. G. W. M. & Junger, M., 2012, In : International journal of public health. 57, 2, p. 351-361 11 p.Research output: Contribution to journal › Article › Academic › peer-review
File10 Citations (Scopus)70 Downloads (Pure) -
Crime science: editorial statement
Junger, M., Laycock, G., Hartel, P. H. & Ratcliffe, J., 11 Jun 2012, In : Crime science. 1, 1, 3 p., 1.Research output: Contribution to journal › Article › Academic
Open AccessFile -
Cultural, social and intrapersonal factors associated with clusters of co-occurring health-related behaviours among adolescents
Klein Velderman, M., Dusseldorp, E., van Nieuwenhuijzen, M., Junger, M., Paulussen, T. G. W. M. & Reijneveld, S. A., 14 May 2015, In : European journal of public health. 25, 1, p. 31-37Research output: Contribution to journal › Article › Academic › peer-review
File9 Citations (Scopus)63 Downloads (Pure) -
Der Einfluss von Bebauung und Nachbarschaft auf das Einbruchrisiko
Lorei, C. (ed.), Montoya, L., Ongena, Y. & Junger, M., 2011, In : Polizei und Wissenschaft. 2011, 3, p. 43-57 17 p.Research output: Contribution to journal › Article › Academic
-
Digital signatures: a tool to prevent and predict dishonesty?
Koning, L., Junger, M. & van Hoof, J., Nov 2020, In : Mind and Society. 19, 2, p. 257-285 29 p.Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile -
Fraud against businesses both online and offline: Crime scripts, business characteristics, efforts, and benefits
Junger, M., Wang, V. & Schlömer, M., 9 Jul 2020, In : Crime science. 9, 1, 13.Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile -
Jeugdcriminaliteit: het belang van vroegtijdig ingrijpen
Junger, M., 2014, In : Spanning. 16, 9, p. 18-19Research output: Contribution to journal › Article › Professional
File200 Downloads (Pure) -
Parental Criminality, Family Violence and Intergenerational Transmission of Crime Within a Birth Cohort
Junger, M., Greene, J., Schipper, R., Hesper, F. & Estourgie, V., 16 Jan 2013, In : European journal on criminal policy and research. 19, 2, p. 117-133 17 p.Research output: Contribution to journal › Article › Academic › peer-review
25 Citations (Scopus) -
Parent-child interaction therapy for preschool children with disruptive behaviour problems in the Netherlands
Abrahamse, M. E., Junger, M., Chavannes, E. L., Coelman, F. J. G., Boer, F. & Lindauer, R. J. L., 2012, In : Child and adolescent psychiatry and mental health. 6, 24, 9 p., 24.Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile29 Citations (Scopus)74 Downloads (Pure) -
Psychometric Properties of the Dutch Eyberg Child Behavior Inventory (ECBI) in a Community Sample and a Multi-Ethnic Clinical Sample
Abrahamse, M., Junger, M., Leijten, P. H. O., Boer, F. & Lindauer, R. J. L., 25 Mar 2015, In : Journal of psychopathology and behavioral assessment. 37, 4, p. 679-691Research output: Contribution to journal › Article › Academic › peer-review
File19 Citations (Scopus)64 Downloads (Pure) -
Psychometric Properties of the Dyadic Parent-Child Interaction Coding System in The Netherlands
Abrahamse, M. E., Niec, L. N., Solomon, D. T., Junger, M. & Lindauer, R. J. L., 16 Jul 2019, In : Child and Family Behavior Therapy. 41, 3, p. 141-158 18 p.Research output: Contribution to journal › Article › Academic › peer-review
1 Citation (Scopus) -
Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources
Barth, S., de Jong, M. D. T., Junger, M., Hartel, P. H. & Roppelt, J. C., 1 Aug 2019, In : Telematics and informatics. 41, p. 55-69 15 p.Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile9 Citations (Scopus)114 Downloads (Pure) -
Risk factors for attrition from an evidence-based parenting program: Findings from the Netherlands
Abrahamse, M., Niec, L. N., Junger, M., Boer, F. & Lindauer, R. J. L., 2016, In : Children and youth services review. 64, p. 42-50Research output: Contribution to journal › Article › Academic › peer-review
13 Citations (Scopus) -
Sex differences in the predictors of juvenile delinquency: females are more susceptible to poor environments; males are influenced more by low self-control
Steketee, M., Junger, M. & Junger-Tas, J., 2013, In : Journal of contemporary criminal justice. 29, 1, p. 88-105Research output: Contribution to journal › Article › Academic › peer-review
14 Citations (Scopus)1 Downloads (Pure) -
Smoking and medication during pregnancy predict repeated unintentional injuries in early childhood but not single unintentional injuries
Junger, M., Japel, C., Cote, S., Xu, Q., Boivin, M. & Tremblay, R. E., 14 Dec 2013, In : Prevention science. 14, 1, p. 13-24 12 p.Research output: Contribution to journal › Article › Academic › peer-review
File4 Citations (Scopus)46 Downloads (Pure) -
Social engineering: digitale fraude en misleiding: een meta-analyse van studies naar de effectiviteit van interventies
Bullee, J-W. H. & Junger, M., Jul 2020, In : Justitiële verkenningen. 46, 2, p. 92-110Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile21 Downloads (Pure) -
Targets for Primary Prevention: Cultural, Social and Intrapersonal Factors Associated with Co-occurring Health-related Behaviours
Dusseldorp, E., Klein Velderman, M., Paulussen, T. G. W. M., Junger, M., van Nieuwenhuijzen, M. & Reijneveld, S. A., 13 Jan 2014, In : Psychology & health. 29, 5, p. 598-611Research output: Contribution to journal › Article › Academic › peer-review
11 Citations (Scopus) -
Teaching Empirical Social-Science Research to Cybersecurity Students: The Case of "Thinking Like a Thief"
Barth, S., Hartel, P. H., Junger, M. & Montoya, L., 14 May 2019, In : IEEE security & privacy. 17, 3, p. 8-16 9 p.Research output: Contribution to journal › Article › Academic › peer-review
-
The effectiveness of parent-child interaction therapy in the Netherlands: Preliminary results of a randomized controlled trial.
Abrahamse, M., Junger, M. & Lindauer, R. J., 2012, In : Neuropsychiatrie de l'enfance et de l'adolesence. 60, 5, p. S88-S88 1 p.Research output: Contribution to journal › Article › Academic › peer-review
-
The persuasion and security awareness experiment: reducing the success of social engineering attacks
Bullee, J-W., Montoya, L., Pieters, W., Junger, M. & Hartel, P. H., Mar 2015, In : Journal of experimental criminology. 11, 1, p. 97-115 19 p.Research output: Contribution to journal › Article › Academic › peer-review
31 Citations (Scopus) -
The Relation Between Residential Property and its Surroundings and Day- and Night-Time Residential Burglary
Montoya, L., Junger, M. & Ongena, Y., Apr 2016, In : Environment and behavior. 48, 4, p. 515-549 35 p.Research output: Contribution to journal › Article › Academic › peer-review
22 Citations (Scopus) -
Traditional, Cyber and Combined Bullying Roles: Differences in Risky Online and Offline Activities
Wachs, S., Junger, M. & Sittichai, R., 2015, In : Societies. 5, 1, p. 109-135Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile -
Treating Child Disruptive Behavior in High-Risk Families: A Comparative Effectiveness Trial from a Community-Based Implementation
Abrahamse, M., Junger, M., van Wouwe, M. A. M. M., Boer, F. & Lindauer, R. J. L., 26 Nov 2015, In : Journal of child and family studies. 25, 5, p. 1605-1622Research output: Contribution to journal › Article › Academic › peer-review
File23 Citations (Scopus)48 Downloads (Pure) -
Wat gaan we doen tegen de cyberaanvallen?
Hartel, P. H., Berg, J. & Junger, M., 2013, In : Informatiebeveiliging. 4, 4, p. 10-11 2 p.Research output: Contribution to journal › Article › Professional
File64 Downloads (Pure) -
Why would we get attacked? An analysis of attacker's aims behind DDoS attacks
Abhishta, A., van Heeswijk, W., Junger, M., Nieuwenhuis, L. J. M. & Joosten, R., 30 Jun 2020, In : Journal of wireless mobile networks, ubiquitous computing, and dependable applications. 11, 2, p. 3-22 19 p.Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile -
Book/Film/Article review
Book review: Crime and Everyday Life by Marcus Felson and Mary Eckert, 5th edition
Hartel, P. H. & Junger, M., 9 Aug 2016, In : Crime science. 5, 10, p. 10:1-10:3 3 p.Research output: Contribution to journal › Book/Film/Article review › Academic
Open AccessFile -
Cyber-offenders versus traditional offenders: an empirical comparison
Junger, M., 2019, In : Tijdschrift voor criminologie. 61, 1, 6 p.Research output: Contribution to journal › Book/Film/Article review › Academic
Open AccessFile -
Book editing
Actuele Criminologie
Dijk, J. J. M. V., Junger, M. & Sagel-grande, I., 2011, Den Haag: SDU. 384 p.Research output: Book/Report › Book editing › Popular
-
Chapter
Jeugdcriminaliteit, het verschil tussen meisjes en jongens
Steketee, M., Junger, M. & Junger-Tas, J., 2013, Criminele meisjes en vrouwen : achtergronden en aanpak. Slotboom, A-M., Hoeve, M., Ezinga, M. & van der Helm, P. (eds.). Den Haag: Boom Lemma, p. 351-380 405 p.Research output: Chapter in Book/Report/Conference proceeding › Chapter › Academic › peer-review
-
New Directions in the study of the relations between parenting and externalizing behaviors in toddlerhood
van Aken, C., Junger, M., Verhoeven, M., van Aken, M. A. G. & Dekovic, M., 2012, Child development and child poverty. Fiedler, A. & Kuester, I. (eds.). New York, NJ, USA: Nova Science, p. 155-176 (Children's Issues, Laws and Programs).Research output: Chapter in Book/Report/Conference proceeding › Chapter › Academic › peer-review
-
New opportunities in the digital age: mobile phone ownership, usage and truancy by high school students
Junger, M., Ottenhof, R. H. J. & Hartel, P. H., 2012, KLM Van Dijk: Liber Amicorum prof.dr.mr. J.J.M. van Dijk. Groenhuijsen, M., Letschert, R. & Hazenbroek, S. (eds.). Nijmegen: Wolf Legal Publishers, p. 191-206Research output: Chapter in Book/Report/Conference proceeding › Chapter › Academic
File17 Downloads (Pure) -
New opportunities in the digital age: mobile phone ownership, usage and truancy by high school students
Junger, M., Ottenhof, R. H. J. & Hartel, P. H., Dec 2012, KLM Van Dijk : Liber Amicorum prof.dr.mr. J.J.M. van Dijk. Groenhuijsen, M., Letschert, R. & Hazenbroek, S. (eds.). Nijmegen: Wolf Legal Publishers, p. 191-206 16 p.Research output: Chapter in Book/Report/Conference proceeding › Chapter › Academic
File36 Downloads (Pure) -
Offenders in a digitized society
Jansen, J., Junger, M., Montoya, L. & Hartel, P. H., 2013, Cybercrime and the police. Stol, W. P. & Jansen, J. (eds.). The Hague, The Netherlands: Eleven International Publishing, p. 45-59 15 p. (Safety & Security Studies).Research output: Chapter in Book/Report/Conference proceeding › Chapter › Academic
-
Prenatal and postnatal preventive interventions based on risk factors
Feder, L. & Junger, M., 2014, Encyclopedia of Criminology and Criminal Justice. Bruinsma, G. & Weisburd, D. (eds.). Springer, p. 3895-3905Research output: Chapter in Book/Report/Conference proceeding › Chapter › Academic › peer-review
-
Social engineering
Bullée, J. W. & Junger, M., 6 Jun 2020, The Palgrave Handbook of International Cybercrime and Cyberdeviance. Holt, T. J. & Bossler, A. M. (eds.). Palgrave Macmillan Ltd., p. 849-875 27 p.Research output: Chapter in Book/Report/Conference proceeding › Chapter › Academic › peer-review
-
Conference contribution
An application to estimate the cyber-risk detection skill of mobile device users
Schaff, G., Harpes, C., Martin, R. & Junger, M., Oct 2013, CENTRIC 2013: The Sixth International Conference on Advances in Human oriented and Personalized Mechanisms, Technologies, and Services. Berntzen, L. & Böhm, S. (eds.). Wilmington, DE: IARIA, p. - 3 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
Open AccessFile122 Downloads (Pure) -
A Note on Analysing the Attacker Aims Behind DDoS Attacks
Abhishta, A., Junger, M., Joosten, R. & Nieuwenhuis, L. J. M., 1 Jan 2020, Intelligent Distributed Computing XIII, IDC 2019. Kotenko, I., Badica, C., Desnitsky, V., El Baz, D. & Ivanovic, M. (eds.). Springer, p. 255-265 11 p. Chapter 30. (Studies in Computational Intelligence; vol. 868).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
Open AccessFile1 Citation (Scopus)141 Downloads (Pure) -
Apate: Anti-Phishing Analysing and Triaging Environment (Poster)
Lastdrager, E. E. H., Hartel, P. H. & Junger, M., 18 May 2015, 36th IEEE Symposium on Security and Privacy. Piscataway, New Jersey: IEEE Computer Society, p. - 2 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
File112 Downloads (Pure) -
Applying the Lost-Letter Technique to Assess IT Risk Behaviour
Lastdrager, E. E. H., Montoya, L., Hartel, P. H. & Junger, M., 10 Jun 2013, Proceedings of the 3rd Workshop on Socio-Technical Aspects in Security and Trust. Piscataway, New Jersey: IEEE Computer Society, p. 2-9 8 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
2 Citations (Scopus) -
How 'Digital' is Traditional Crime?
Montoya, L., Junger, M. & Hartel, P. H., Jun 2013, European Intelligence and Security Informatics Conference, EISIC 2013. USA: IEEE Computer Society, p. 31-37 7 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
5 Citations (Scopus)1 Downloads (Pure) -
Modus operandi study of information and communication technology (ICT) facilitated crime
Montoya, L., Junger, M. & Hartel, P., 14 Jun 2013, Congresbundel NVC Congres: 13 en 14 juni 2013, Kamerlingh Onnes Gebouw (KOG), Faculteit der Rechtsgeleerdheid, Universiteit Leiden. Leiden, The Netherlands: Nederlandse Vereniging voor Criminologie, p. 93 1 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic
Open AccessFile105 Downloads (Pure) -
Regression Nodes: Extending attack trees with data from social sciences
Bullee, J-W., Montoya, L., Pieters, W., Junger, M. & Hartel, P. H., Jul 2015, Proceedings of the Workshop on Socio-Technical Aspects in Security and Trust (STAST 2015). Piscataway, New Jersey: IEEE Computer Society, p. 17-23 7 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
2 Citations (Scopus) -
RISK-DET: ICT Security Awareness Aspect Combining Education and Cognitive Sciences
Schaff, G., Harpes, C., Aubigny, M., Junger, M. & Martin, R., 23 Jun 2014, Ninth International Multi-Conference on Computing in the Global Information Technology, ICCGI 2014. Leist, A. & Pankowski, T. (eds.). Wilmington, Delaware: IARIA, 3 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
-
Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention
Bullee, J-W., Montoya, L., Junger, M. & Hartel, P. H., Jan 2016, Proceedings of the inaugural Singapore Cyber Security R&D Conference (SG-CRC 2016). Mathur, A. & Roychoudhury, A. (eds.). Amsterdam: IOS Press, p. 107-114 6 p. (Cryptology and Information Security Series; vol. 14).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
File9 Citations (Scopus)292 Downloads (Pure) -
Victim routine influences the number of DDoS attacks: Evidence from Dutch educational network
Abhishta, A., Junger, M., Joosten, R. & Nieuwenhuis, L. J. M., 19 Sep 2019, 2019 IEEE Security and Privacy Workshops, SPW 2019. IEEE, p. 242-247 6 p. 8844620Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
1 Citation (Scopus)5 Downloads (Pure) -
Paper
Cybersafety Threats - from Deception to Aggression
Benenson, Z., Junger, M., Oliveira, D. & Stringhini, G., Jul 2019.Research output: Contribution to conference › Paper › Academic › peer-review
Open AccessFile93 Downloads (Pure) -
Parental Mental Health and Self-Control as Predictors of Effortful Control in Young Boys: Mediating Effects of Parenting Behaviors
Karreman, A., van Aken, M., Dekovic, M., Verhoeven, M., Junger, M., van de Beek, C., van Aken, C. & Doreleijers, T. A. H., 19 Mar 2015.Research output: Contribution to conference › Paper › Academic
-
Repeat victimization in cyber space
Junger, M., Wachs, S., Broekman, C. & Lastdrager, E. E. H., 6 Nov 2014, p. -.Research output: Contribution to conference › Paper › Academic
-
What is convergence in time and space for cyber crime?
Hartel, P. & Junger, M., 28 Mar 2011, p. -.Research output: Contribution to conference › Paper › Academic