Find Research Outputs

Search in all content

Filters for Research Output

Search concepts
Selected filters

Publication Year

  • 2020
  • 2019
  • 2018
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011

Author

  • Lorena Montoya

Applying the Lost-Letter Technique to Assess IT Risk Behaviour

Lastdrager, E. E. H., Montoya, L., Hartel, P. H. & Junger, M., 10 Jun 2013, Proceedings of the 3rd Workshop on Socio-Technical Aspects in Security and Trust. Piscataway, New Jersey: IEEE Computer Society, p. 2-9 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)
63 Downloads (Pure)

Cost-effectiveness of Security Measures: A model-based Framework

Pieters, W., Probst, C. W., Lukszo, Z. & Montoya, L., Jan 2014, Approaches and Processes for Managing the Economics of Information Systems. Tsiakis, T., Kargidis, T. & Katsaros, P. (eds.). Hershey, PA: IGI Global, p. 139-156 18 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

8 Citations (Scopus)
2 Downloads (Pure)

Der Einfluss von Bebauung und Nachbarschaft auf das Einbruchrisiko

Lorei, C. (ed.), Montoya, L., Ongena, Y. & Junger, M., 2011, In : Polizei und Wissenschaft. 2011, 3, p. 43-57 17 p.

Research output: Contribution to journalArticleAcademic

Effect of Land Use and Transportation Infrastructure on Residential Burglary

Montoya, L., 2011, p. 20-20. 1 p.

Research output: Contribution to conferencePaper

File
138 Downloads (Pure)

Elements at risk

Kingma, N., McCall, M. K. & Montoya, L., 2011, Multi-hazard risk assessment. van Westen, C. J., Alkema, D., Damen, M. C. J., Kerle, N. & Kingma, N. C. (eds.). Enschede: UNU - ITC DGIM, p. 401-443 43 p. (Distance Education Course Guide Book).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

5 Downloads (Pure)

Het succes van social engineering

Bullee, J-W., Montoya, L., Junger, M. & Hartel, P., 2018, In : Tijdschrift voor veiligheid. 17, 1-2, p. 40-53 14 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
196 Downloads (Pure)

How 'Digital' is Traditional Crime?

Montoya, L., Junger, M. & Hartel, P. H., Jun 2013, European Intelligence and Security Informatics Conference, EISIC 2013. USA: IEEE Computer Society, p. 31-37 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

5 Citations (Scopus)
1 Downloads (Pure)

Incorporating FAIR into Bayesian Network for Numerical Assessment of Loss Event Frequencies of Smart Grid Cyber Threats

Le, A., Chen, Y., Chai, K. K., Vasenev, A. & Montoya, L., 1 Sep 2018, In : Mobile networks & applications. 9 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
3 Citations (Scopus)
101 Downloads (Pure)

Modelling urban crime through workforce size: a test of the activity support concept

Montoya, L., 2015, In : Environment and planning. Part B: Planning and design. 42, 3, p. 399-414 40 p.

Research output: Contribution to journalArticleAcademicpeer-review

3 Citations (Scopus)

Modus operandi onderzoek naar door informatie en communicatie technologie (ICT) gefaciliteerde criminaliteit

Junger, M., Montoya, L., Hartel, P. H. & Karemaker, M., Jan 2013, Enschede: Centre for Telematics and Information Technology (CTIT). (CTIT Technical Report Series; no. TR-CTIT-13-07)

Research output: Book/ReportReportOther research output

File
161 Downloads (Pure)

Modus operandi study of information and communication technology (ICT) facilitated crime

Montoya, L., Junger, M. & Hartel, P., 14 Jun 2013, Congresbundel NVC Congres: 13 en 14 juni 2013, Kamerlingh Onnes Gebouw (KOG), Faculteit der Rechtsgeleerdheid, Universiteit Leiden. Leiden, The Netherlands: Nederlandse Vereniging voor Criminologie, p. 93 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

Open Access
File
88 Downloads (Pure)

Offenders in a digitized society

Jansen, J., Junger, M., Montoya, L. & Hartel, P. H., 2013, Cybercrime and the police. Stol, W. P. & Jansen, J. (eds.). The Hague, The Netherlands: Eleven International Publishing, p. 45-59 15 p. (Safety & Security Studies).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

Online social sports networks as crime facilitators

Stottelaar, B., Senden, J. & Montoya, L., Jun 2014, In : Crime science. 3, 8, p. 1-20 20 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
6 Citations (Scopus)
60 Downloads (Pure)

On the anatomy of social engineering attacks: A literature-based dissection of successful attacks

Bullée, J-W. H., Montoya, L., Pieters, W., Junger, M. & Hartel, P., Jan 2018, In : Journal of Investigative Psychology and Offender Profiling. 15, 1, p. 20-45 26 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
5 Citations (Scopus)
88 Downloads (Pure)

Regression Nodes: Extending attack trees with data from social sciences

Bullee, J-W., Montoya, L., Pieters, W., Junger, M. & Hartel, P. H., Jul 2015, Proceedings of the Workshop on Socio-Technical Aspects in Security and Trust (STAST 2015). Piscataway, New Jersey: IEEE Computer Society, p. 17-23 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

Teaching Empirical Social-Science Research to Cybersecurity Students: The Case of "Thinking Like a Thief"

Barth, S., Hartel, P. H., Junger, M. & Montoya, L., 14 May 2019, In : IEEE security & privacy. 17, 3, p. 8-16 9 p.

Research output: Contribution to journalArticleAcademicpeer-review

1 Downloads (Pure)

Technology-supported Risk Estimation by Predictive Assessment of Socio-technical Security

Coles-Kemp, L., Bullée, J-W., Montoya, L., Junger, M., Heath, C. P., Pieters, W. & Wolos, L., 2015, Trespass Project. 96 p.

Research output: Book/ReportReportProfessional

Open Access
File
13 Downloads (Pure)

The persuasion and security awareness experiment: reducing the success of social engineering attacks

Bullee, J-W., Montoya, L., Pieters, W., Junger, M. & Hartel, P. H., Mar 2015, In : Journal of experimental criminology. 11, 1, p. 97-115 19 p.

Research output: Contribution to journalArticleAcademicpeer-review

31 Citations (Scopus)

The TREsPASS project

Montoya, L., Oct 2013, ICTOpen2013. Netherlands: ICTOPEN, p. 1-1 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

File
58 Downloads (Pure)

Threat Analysis in Systems-of-Systems: An Emergence-Oriented Approach

Ceccarelli, A., Zoppi, T., Vasenev, A., Mori, M., Ionita, D., Montoya, L. & Bondavalli, A., Oct 2018, In : ACM Transactions on Cyber-Physical Systems. 3, 2, 24 p., 18.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
3 Citations (Scopus)
25 Downloads (Pure)

TREsPASS: Plug-and-Play Attacker Profiles for Security Risk Analysis (Poster)

Pieters, W., Hadziosmanovic, D., Lenin, A., Montoya, L. & Willemson, J., May 2014, 35th IEEE Symposium on Security and Privacy. Piscataway, New Jersey: IEEE Computer Society, 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
41 Downloads (Pure)