Search concepts
|
Selected filters |
- 1 - 50 out of 63 results
- Export search results
Search results
-
Article
A cross-national study of direct and indirect effects of cyberbullying on cybergrooming victimization via self-esteem
Wachs, S., Jiskrova, G. K., Vazsonyi, A. T., Wolf, K. D. & Junger, M., 2 Mar 2016, In : Psicologia educativa. 22, 1, p. 61-70Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile21 Citations (Scopus)97 Downloads (Pure) -
Clustering of health and risk behaviour in immigrant and indigenous Dutch residents aged 19-40 years.
Reijneveld, S. A., van Nieuwenhuijzen, M., Klein Velderman, M., Paulussen, T. G. W. M. & Junger, M., 2012, In : International journal of public health. 57, 2, p. 351-361 11 p.Research output: Contribution to journal › Article › Academic › peer-review
File10 Citations (Scopus)70 Downloads (Pure) -
Correlates of Mono- and Dual-Victims of Cybergrooming and Cyberbullying: Evidence from Four Countries
Wachs, S., Whittle, H. C., Hamilton-Giachritsis, C., Wolf, K. D., Vazsonyi, A. T. & Junger, M., 1 Feb 2018, In : Cyberpsychology, behavior and social networking. 21, 2, p. 91-98 8 p.Research output: Contribution to journal › Article › Academic › peer-review
7 Citations (Scopus) -
Crime science: editorial statement
Junger, M., Laycock, G., Hartel, P. H. & Ratcliffe, J., 11 Jun 2012, In : Crime science. 1, 1, 3 p., 1.Research output: Contribution to journal › Article › Academic
Open AccessFile -
Cultural, social and intrapersonal factors associated with clusters of co-occurring health-related behaviours among adolescents
Klein Velderman, M., Dusseldorp, E., van Nieuwenhuijzen, M., Junger, M., Paulussen, T. G. W. M. & Reijneveld, S. A., 14 May 2015, In : European journal of public health. 25, 1, p. 31-37Research output: Contribution to journal › Article › Academic › peer-review
File9 Citations (Scopus)63 Downloads (Pure) -
Der Einfluss von Bebauung und Nachbarschaft auf das Einbruchrisiko
Lorei, C. (ed.), Montoya, L., Ongena, Y. & Junger, M., 2011, In : Polizei und Wissenschaft. 2011, 3, p. 43-57 17 p.Research output: Contribution to journal › Article › Academic
-
Digital signatures: a tool to prevent and predict dishonesty?
Koning, L., Junger, M. & van Hoof, J., Nov 2020, In : Mind and Society. 19, 2, p. 257-285 29 p.Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile -
Fraud against businesses both online and offline: Crime scripts, business characteristics, efforts, and benefits
Junger, M., Wang, V. & Schlömer, M., 9 Jul 2020, In : Crime science. 9, 1, 13.Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile -
Het succes van social engineering
Bullee, J-W., Montoya, L., Junger, M. & Hartel, P., 2018, In : Tijdschrift voor veiligheid. 17, 1-2, p. 40-53 14 p.Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile -
On the anatomy of social engineering attacks: A literature-based dissection of successful attacks
Bullée, J-W. H., Montoya, L., Pieters, W., Junger, M. & Hartel, P., Jan 2018, In : Journal of Investigative Psychology and Offender Profiling. 15, 1, p. 20-45 26 p.Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile7 Citations (Scopus)101 Downloads (Pure) -
Parental Criminality, Family Violence and Intergenerational Transmission of Crime Within a Birth Cohort
Junger, M., Greene, J., Schipper, R., Hesper, F. & Estourgie, V., 16 Jan 2013, In : European journal on criminal policy and research. 19, 2, p. 117-133 17 p.Research output: Contribution to journal › Article › Academic › peer-review
25 Citations (Scopus) -
Parental Self-Control and the Development of Male Aggression in Early Childhood: A Longitudinal Test of Self-Control Theory
Meldrum, R. C., Verhoeven, M., Junger, M., van Aken, M. A. G. & Dekovic, M., 1 Mar 2018, In : International journal of offender therapy and comparative criminology. 62, 4, p. 935-957 23 p.Research output: Contribution to journal › Article › Academic › peer-review
12 Citations (Scopus) -
Parent-child interaction therapy for preschool children with disruptive behaviour problems in the Netherlands
Abrahamse, M. E., Junger, M., Chavannes, E. L., Coelman, F. J. G., Boer, F. & Lindauer, R. J. L., 2012, In : Child and adolescent psychiatry and mental health. 6, 24, 9 p., 24.Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile29 Citations (Scopus)74 Downloads (Pure) -
Psychometric Properties of the Dutch Eyberg Child Behavior Inventory (ECBI) in a Community Sample and a Multi-Ethnic Clinical Sample
Abrahamse, M., Junger, M., Leijten, P. H. O., Boer, F. & Lindauer, R. J. L., 25 Mar 2015, In : Journal of psychopathology and behavioral assessment. 37, 4, p. 679-691Research output: Contribution to journal › Article › Academic › peer-review
File19 Citations (Scopus)64 Downloads (Pure) -
Psychometric Properties of the Dyadic Parent-Child Interaction Coding System in The Netherlands
Abrahamse, M. E., Niec, L. N., Solomon, D. T., Junger, M. & Lindauer, R. J. L., 16 Jul 2019, In : Child and Family Behavior Therapy. 41, 3, p. 141-158 18 p.Research output: Contribution to journal › Article › Academic › peer-review
1 Citation (Scopus) -
Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources
Barth, S., de Jong, M. D. T., Junger, M., Hartel, P. H. & Roppelt, J. C., 1 Aug 2019, In : Telematics and informatics. 41, p. 55-69 15 p.Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile9 Citations (Scopus)114 Downloads (Pure) -
Risk factors for attrition from an evidence-based parenting program: Findings from the Netherlands
Abrahamse, M., Niec, L. N., Junger, M., Boer, F. & Lindauer, R. J. L., 2016, In : Children and youth services review. 64, p. 42-50Research output: Contribution to journal › Article › Academic › peer-review
13 Citations (Scopus) -
Sex differences in the predictors of juvenile delinquency: females are more susceptible to poor environments; males are influenced more by low self-control
Steketee, M., Junger, M. & Junger-Tas, J., 2013, In : Journal of contemporary criminal justice. 29, 1, p. 88-105Research output: Contribution to journal › Article › Academic › peer-review
14 Citations (Scopus)1 Downloads (Pure) -
Smoking and medication during pregnancy predict repeated unintentional injuries in early childhood but not single unintentional injuries
Junger, M., Japel, C., Cote, S., Xu, Q., Boivin, M. & Tremblay, R. E., 14 Dec 2013, In : Prevention science. 14, 1, p. 13-24 12 p.Research output: Contribution to journal › Article › Academic › peer-review
File4 Citations (Scopus)46 Downloads (Pure) -
Social engineering: digitale fraude en misleiding: een meta-analyse van studies naar de effectiviteit van interventies
Bullee, J-W. H. & Junger, M., Jul 2020, In : Justitiële verkenningen. 46, 2, p. 92-110Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile21 Downloads (Pure) -
Teaching Empirical Social-Science Research to Cybersecurity Students: The Case of "Thinking Like a Thief"
Barth, S., Hartel, P. H., Junger, M. & Montoya, L., 14 May 2019, In : IEEE security & privacy. 17, 3, p. 8-16 9 p.Research output: Contribution to journal › Article › Academic › peer-review
-
The effectiveness of parent-child interaction therapy in the Netherlands: Preliminary results of a randomized controlled trial.
Abrahamse, M., Junger, M. & Lindauer, R. J., 2012, In : Neuropsychiatrie de l'enfance et de l'adolesence. 60, 5, p. S88-S88 1 p.Research output: Contribution to journal › Article › Academic › peer-review
-
The influence of the presentation of camera surveillance on cheating and pro-social behavior
Jansen, A. M., Giebels, E., van Rompay, T. J. L. & Junger, M., 16 Oct 2018, In : Frontiers in psychology. 9, OCT, 1937.Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile1 Citation (Scopus)52 Downloads (Pure) -
The persuasion and security awareness experiment: reducing the success of social engineering attacks
Bullee, J-W., Montoya, L., Pieters, W., Junger, M. & Hartel, P. H., Mar 2015, In : Journal of experimental criminology. 11, 1, p. 97-115 19 p.Research output: Contribution to journal › Article › Academic › peer-review
31 Citations (Scopus) -
The Relation Between Residential Property and its Surroundings and Day- and Night-Time Residential Burglary
Montoya, L., Junger, M. & Ongena, Y., Apr 2016, In : Environment and behavior. 48, 4, p. 515-549 35 p.Research output: Contribution to journal › Article › Academic › peer-review
22 Citations (Scopus) -
Traditional, Cyber and Combined Bullying Roles: Differences in Risky Online and Offline Activities
Wachs, S., Junger, M. & Sittichai, R., 2015, In : Societies. 5, 1, p. 109-135Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile -
Treating Child Disruptive Behavior in High-Risk Families: A Comparative Effectiveness Trial from a Community-Based Implementation
Abrahamse, M., Junger, M., van Wouwe, M. A. M. M., Boer, F. & Lindauer, R. J. L., 26 Nov 2015, In : Journal of child and family studies. 25, 5, p. 1605-1622Research output: Contribution to journal › Article › Academic › peer-review
File23 Citations (Scopus)48 Downloads (Pure) -
Victims of cybercrime in Europe: a review of victim surveys
Reep-van den Bergh, C. M. M. & Junger, M., 1 Dec 2018, In : Crime science. 7, 1, 15 p., 5.Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile8 Citations (Scopus)153 Downloads (Pure) -
Wat gaan we doen tegen de cyberaanvallen?
Hartel, P. H., Berg, J. & Junger, M., 2013, In : Informatiebeveiliging. 4, 4, p. 10-11 2 p.Research output: Contribution to journal › Article › Professional
File64 Downloads (Pure) -
Why would we get attacked? An analysis of attacker's aims behind DDoS attacks
Abhishta, A., van Heeswijk, W., Junger, M., Nieuwenhuis, L. J. M. & Joosten, R., 30 Jun 2020, In : Journal of wireless mobile networks, ubiquitous computing, and dependable applications. 11, 2, p. 3-22 19 p.Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile -
Book/Film/Article review
Book review: Crime and Everyday Life by Marcus Felson and Mary Eckert, 5th edition
Hartel, P. H. & Junger, M., 9 Aug 2016, In : Crime science. 5, 10, p. 10:1-10:3 3 p.Research output: Contribution to journal › Book/Film/Article review › Academic
Open AccessFile -
Cyber-offenders versus traditional offenders: an empirical comparison
Junger, M., 2019, In : Tijdschrift voor criminologie. 61, 1, 6 p.Research output: Contribution to journal › Book/Film/Article review › Academic
Open AccessFile -
Book editing
Actuele Criminologie
Dijk, J. J. M. V., Junger, M. & Sagel-grande, I., 2011, Den Haag: SDU. 384 p.Research output: Book/Report › Book editing › Popular
-
Chapter
Computer Science
Hartel, P. H. & Junger, M., 30 Dec 2018, Routledge Handbook of Crime Science: Every new technology brings new opportunity for crime, and information and communication technology (ICT) is no exception. This short article offers students of crime insights in the two main connections between ICT and criminology. On the one hand we show how ICT can be used as a tool, target, or location of crime. On the other hand we show how ICT can be used as a tool to study crime.. Wortley, R., Sidebottom, A., Tilley, N. & Laycock, G. (eds.). 1 ed. London: Routledge, p. 179-189 11 p.Research output: Chapter in Book/Report/Conference proceeding › Chapter › Academic › peer-review
-
Jeugdcriminaliteit, het verschil tussen meisjes en jongens
Steketee, M., Junger, M. & Junger-Tas, J., 2013, Criminele meisjes en vrouwen : achtergronden en aanpak. Slotboom, A-M., Hoeve, M., Ezinga, M. & van der Helm, P. (eds.). Den Haag: Boom Lemma, p. 351-380 405 p.Research output: Chapter in Book/Report/Conference proceeding › Chapter › Academic › peer-review
-
New Directions in the study of the relations between parenting and externalizing behaviors in toddlerhood
van Aken, C., Junger, M., Verhoeven, M., van Aken, M. A. G. & Dekovic, M., 2012, Child development and child poverty. Fiedler, A. & Kuester, I. (eds.). New York, NJ, USA: Nova Science, p. 155-176 (Children's Issues, Laws and Programs).Research output: Chapter in Book/Report/Conference proceeding › Chapter › Academic › peer-review
-
New opportunities in the digital age: mobile phone ownership, usage and truancy by high school students
Junger, M., Ottenhof, R. H. J. & Hartel, P. H., 2012, KLM Van Dijk: Liber Amicorum prof.dr.mr. J.J.M. van Dijk. Groenhuijsen, M., Letschert, R. & Hazenbroek, S. (eds.). Nijmegen: Wolf Legal Publishers, p. 191-206Research output: Chapter in Book/Report/Conference proceeding › Chapter › Academic
File17 Downloads (Pure) -
New opportunities in the digital age: mobile phone ownership, usage and truancy by high school students
Junger, M., Ottenhof, R. H. J. & Hartel, P. H., Dec 2012, KLM Van Dijk : Liber Amicorum prof.dr.mr. J.J.M. van Dijk. Groenhuijsen, M., Letschert, R. & Hazenbroek, S. (eds.). Nijmegen: Wolf Legal Publishers, p. 191-206 16 p.Research output: Chapter in Book/Report/Conference proceeding › Chapter › Academic
File36 Downloads (Pure) -
Offenders in a digitized society
Jansen, J., Junger, M., Montoya, L. & Hartel, P. H., 2013, Cybercrime and the police. Stol, W. P. & Jansen, J. (eds.). The Hague, The Netherlands: Eleven International Publishing, p. 45-59 15 p. (Safety & Security Studies).Research output: Chapter in Book/Report/Conference proceeding › Chapter › Academic
-
Social engineering
Bullée, J. W. & Junger, M., 6 Jun 2020, The Palgrave Handbook of International Cybercrime and Cyberdeviance. Holt, T. J. & Bossler, A. M. (eds.). Palgrave Macmillan Ltd., p. 849-875 27 p.Research output: Chapter in Book/Report/Conference proceeding › Chapter › Academic › peer-review
-
Conference contribution
An application to estimate the cyber-risk detection skill of mobile device users
Schaff, G., Harpes, C., Martin, R. & Junger, M., Oct 2013, CENTRIC 2013: The Sixth International Conference on Advances in Human oriented and Personalized Mechanisms, Technologies, and Services. Berntzen, L. & Böhm, S. (eds.). Wilmington, DE: IARIA, p. - 3 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
Open AccessFile122 Downloads (Pure) -
A Note on Analysing the Attacker Aims Behind DDoS Attacks
Abhishta, A., Junger, M., Joosten, R. & Nieuwenhuis, L. J. M., 1 Jan 2020, Intelligent Distributed Computing XIII, IDC 2019. Kotenko, I., Badica, C., Desnitsky, V., El Baz, D. & Ivanovic, M. (eds.). Springer, p. 255-265 11 p. Chapter 30. (Studies in Computational Intelligence; vol. 868).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
Open AccessFile1 Citation (Scopus)141 Downloads (Pure) -
Apate: Anti-Phishing Analysing and Triaging Environment (Poster)
Lastdrager, E. E. H., Hartel, P. H. & Junger, M., 18 May 2015, 36th IEEE Symposium on Security and Privacy. Piscataway, New Jersey: IEEE Computer Society, p. - 2 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
File112 Downloads (Pure) -
Applying the Lost-Letter Technique to Assess IT Risk Behaviour
Lastdrager, E. E. H., Montoya, L., Hartel, P. H. & Junger, M., 10 Jun 2013, Proceedings of the 3rd Workshop on Socio-Technical Aspects in Security and Trust. Piscataway, New Jersey: IEEE Computer Society, p. 2-9 8 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
2 Citations (Scopus) -
How 'Digital' is Traditional Crime?
Montoya, L., Junger, M. & Hartel, P. H., Jun 2013, European Intelligence and Security Informatics Conference, EISIC 2013. USA: IEEE Computer Society, p. 31-37 7 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
5 Citations (Scopus)1 Downloads (Pure) -
Modus operandi study of information and communication technology (ICT) facilitated crime
Montoya, L., Junger, M. & Hartel, P., 14 Jun 2013, Congresbundel NVC Congres: 13 en 14 juni 2013, Kamerlingh Onnes Gebouw (KOG), Faculteit der Rechtsgeleerdheid, Universiteit Leiden. Leiden, The Netherlands: Nederlandse Vereniging voor Criminologie, p. 93 1 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic
Open AccessFile105 Downloads (Pure) -
Regression Nodes: Extending attack trees with data from social sciences
Bullee, J-W., Montoya, L., Pieters, W., Junger, M. & Hartel, P. H., Jul 2015, Proceedings of the Workshop on Socio-Technical Aspects in Security and Trust (STAST 2015). Piscataway, New Jersey: IEEE Computer Society, p. 17-23 7 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
2 Citations (Scopus) -
Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention
Bullee, J-W., Montoya, L., Junger, M. & Hartel, P. H., Jan 2016, Proceedings of the inaugural Singapore Cyber Security R&D Conference (SG-CRC 2016). Mathur, A. & Roychoudhury, A. (eds.). Amsterdam: IOS Press, p. 107-114 6 p. (Cryptology and Information Security Series; vol. 14).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
File9 Citations (Scopus)292 Downloads (Pure) -
Victim routine influences the number of DDoS attacks: Evidence from Dutch educational network
Abhishta, A., Junger, M., Joosten, R. & Nieuwenhuis, L. J. M., 19 Sep 2019, 2019 IEEE Security and Privacy Workshops, SPW 2019. IEEE, p. 242-247 6 p. 8844620Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
1 Citation (Scopus)5 Downloads (Pure) -
Paper
Cybersafety Threats - from Deception to Aggression
Benenson, Z., Junger, M., Oliveira, D. & Stringhini, G., Jul 2019.Research output: Contribution to conference › Paper › Academic › peer-review
Open AccessFile93 Downloads (Pure)