Find Research Outputs

Search in all content

Filters for Research Output

Search concepts
Selected filters

Publication Year

  • 2020
  • 2019
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011

Author

  • Marianne Junger
2020

A Note on Analysing the Attacker Aims Behind DDoS Attacks

Abhishta, A., Junger, M., Joosten, R. & Nieuwenhuis, L. J. M., 1 Jan 2020, Intelligent Distributed Computing XIII, IDC 2019. Kotenko, I., Badica, C., Desnitsky, V., El Baz, D. & Ivanovic, M. (eds.). Springer, p. 255-265 11 p. Chapter 30. (Studies in Computational Intelligence; vol. 868).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
1 Citation (Scopus)
105 Downloads (Pure)

Digital signatures: a tool to prevent and predict dishonesty?

Koning, L., Junger, M. & van Hoof, J., 7 Jul 2020, In : Mind and Society.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
5 Downloads (Pure)
Open Access
File
52 Downloads (Pure)
2019

Cyber-offenders versus traditional offenders: an empirical comparison

Junger, M., 2019, In : Tijdschrift voor criminologie. 61, 1, 6 p.

Research output: Contribution to journalBook/Film/Article reviewAcademic

Open Access
File
25 Downloads (Pure)

Cybersafety Threats - from Deception to Aggression

Benenson, Z., Junger, M., Oliveira, D. & Stringhini, G., Jul 2019.

Research output: Contribution to conferencePaperAcademicpeer-review

Open Access
File
31 Downloads (Pure)

De boer aan het woord: diepte-interviews over het agrarisch ondernemerschap anno 2019

Junger, M., van Hoof, J. J., Koning, L. & Nab, M., 2019, University of Twente.

Research output: Book/ReportReportProfessional

Laptop Theft in a University Setting can be Avoided with Warnings

Nadeem, A. & Junger, M., 18 Jul 2019, ArXiv.

Research output: Working paper

Open Access
File
7 Downloads (Pure)
61 Downloads (Pure)

Psychometric Properties of the Dyadic Parent-Child Interaction Coding System in The Netherlands

Abrahamse, M. E., Niec, L. N., Solomon, D. T., Junger, M. & Lindauer, R. J. L., 16 Jul 2019, In : Child and Family Behavior Therapy. 41, 3, p. 141-158 18 p.

Research output: Contribution to journalArticleAcademicpeer-review

1 Citation (Scopus)
Open Access
File
6 Citations (Scopus)
92 Downloads (Pure)

Teaching Empirical Social-Science Research to Cybersecurity Students: The Case of "Thinking Like a Thief"

Barth, S., Hartel, P. H., Junger, M. & Montoya, L., 14 May 2019, In : IEEE security & privacy. 17, 3, p. 8-16 9 p.

Research output: Contribution to journalArticleAcademicpeer-review

1 Downloads (Pure)

Victim routine influences the number of DDoS attacks: Evidence from Dutch educational network

Abhishta, A., Junger, M., Joosten, R. & Nieuwenhuis, L. J. M., 19 Sep 2019, 2019 IEEE Security and Privacy Workshops, SPW 2019. IEEE, p. 242-247 6 p. 8844620

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)
4 Downloads (Pure)

How Effective is Anti-Phishing Training for Children? (Distinguished Paper Award)

Lastdrager, E. E. H., Carvajal Gallardo, I. R., Hartel, P. H. & Junger, M., 14 Jul 2017, Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association, p. 229-239 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
25 Downloads (Pure)

Order and control in the environment: Exploring the effects on undesired behaviour and the importance of locus of control

Jansen, A. M., Giebels, E., van Rompay, T. J. L., Austrup, S. & Junger, M., Sep 2017, In : Legal and criminological psychology. 22, 2, p. 213-227

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
341 Downloads (Pure)

Priming and warnings are not effective to prevent social engineering attacks

Junger, M., Montoya, L. & Overink, F. J., 2017, In : Computers in human behavior. 66, p. 75-87 13 p.

Research output: Contribution to journalArticleAcademicpeer-review

39 Citations (Scopus)
1 Downloads (Pure)

Spear phishing in organisations explained

Bullee, J-W., Montoya, L., Junger, M. & Hartel, P., Jul 2017, In : Information and Computer Security. 25, 5, p. 593-613 21 p.

Research output: Contribution to journalArticleAcademicpeer-review

12 Citations (Scopus)
1 Downloads (Pure)

The role of self-control and cognitive functioning in educational inequalities in adolescent smoking and binge drinking

Davies, L. E. M., Kuipers, M. A. G., Junger, M. & Kunst, A. E., 16 Sep 2017, In : BMC public health. 17, 9 p., 714.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
3 Citations (Scopus)
62 Downloads (Pure)

Towards the normalization of cybercrime victimization: A routine activities analysis of cybercrime in europe

Junger, M., Montoya, L., Hartel, P. H. & Heydari, M., 19 Oct 2017, 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA). IEEE

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)
2016

A cross-national study of direct and indirect effects of cyberbullying on cybergrooming victimization via self-esteem

Wachs, S., Jiskrova, G. K., Vazsonyi, A. T., Wolf, K. D. & Junger, M., 2 Mar 2016, In : Psicologia educativa. 22, 1, p. 61-70

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
20 Citations (Scopus)
89 Downloads (Pure)

Book review: Crime and Everyday Life by Marcus Felson and Mary Eckert, 5th edition

Hartel, P. H. & Junger, M., 9 Aug 2016, In : Crime science. 5, 10, p. 10:1-10:3 3 p.

Research output: Contribution to journalBook/Film/Article reviewAcademic

Open Access
File
41 Downloads (Pure)

Risk factors for attrition from an evidence-based parenting program: Findings from the Netherlands

Abrahamse, M., Niec, L. N., Junger, M., Boer, F. & Lindauer, R. J. L., 2016, In : Children and youth services review. 64, p. 42-50

Research output: Contribution to journalArticleAcademicpeer-review

12 Citations (Scopus)

Slachtofferschap bij cybercrime: pilotonderzoek

Junger, M., Wiegersma, S., de Vries, T. & Veldkamp, B. P., 2016, Enschede: Universiteit Twente.

Research output: Book/ReportReportProfessional

Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention

Bullee, J-W., Montoya, L., Junger, M. & Hartel, P. H., Jan 2016, Proceedings of the inaugural Singapore Cyber Security R&D Conference (SG-CRC 2016). Mathur, A. & Roychoudhury, A. (eds.). Amsterdam: IOS Press, p. 107-114 6 p. (Cryptology and Information Security Series; vol. 14).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
9 Citations (Scopus)
254 Downloads (Pure)

The Relation Between Residential Property and its Surroundings and Day- and Night-Time Residential Burglary

Montoya, L., Junger, M. & Ongena, Y., Apr 2016, In : Environment and behavior. 48, 4, p. 515-549 35 p.

Research output: Contribution to journalArticleAcademicpeer-review

22 Citations (Scopus)
2015

Apate: Anti-Phishing Analysing and Triaging Environment (Poster)

Lastdrager, E. E. H., Hartel, P. H. & Junger, M., 18 May 2015, 36th IEEE Symposium on Security and Privacy. Piscataway, New Jersey: IEEE Computer Society, p. - 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
110 Downloads (Pure)

Cultural, social and intrapersonal factors associated with clusters of co-occurring health-related behaviours among adolescents

Klein Velderman, M., Dusseldorp, E., van Nieuwenhuijzen, M., Junger, M., Paulussen, T. G. W. M. & Reijneveld, S. A., 14 May 2015, In : European journal of public health. 25, 1, p. 31-37

Research output: Contribution to journalArticleAcademicpeer-review

File
9 Citations (Scopus)
58 Downloads (Pure)

Parental Mental Health and Self-Control as Predictors of Effortful Control in Young Boys: Mediating Effects of Parenting Behaviors

Karreman, A., van Aken, M., Dekovic, M., Verhoeven, M., Junger, M., van de Beek, C., van Aken, C. & Doreleijers, T. A. H., 19 Mar 2015.

Research output: Contribution to conferencePaper

Psychometric Properties of the Dutch Eyberg Child Behavior Inventory (ECBI) in a Community Sample and a Multi-Ethnic Clinical Sample

Abrahamse, M., Junger, M., Leijten, P. H. O., Boer, F. & Lindauer, R. J. L., 25 Mar 2015, In : Journal of psychopathology and behavioral assessment. 37, 4, p. 679-691

Research output: Contribution to journalArticleAcademicpeer-review

File
17 Citations (Scopus)
59 Downloads (Pure)

Regression Nodes: Extending attack trees with data from social sciences

Bullee, J-W., Montoya, L., Pieters, W., Junger, M. & Hartel, P. H., Jul 2015, Proceedings of the Workshop on Socio-Technical Aspects in Security and Trust (STAST 2015). Piscataway, New Jersey: IEEE Computer Society, p. 17-23 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

Technology-supported Risk Estimation by Predictive Assessment of Socio-technical Security

Coles-Kemp, L., Bullée, J-W., Montoya, L., Junger, M., Heath, C. P., Pieters, W. & Wolos, L., 2015, Trespass Project. 96 p.

Research output: Book/ReportReportProfessional

Open Access
File
13 Downloads (Pure)

The persuasion and security awareness experiment: reducing the success of social engineering attacks

Bullee, J-W., Montoya, L., Pieters, W., Junger, M. & Hartel, P. H., Mar 2015, In : Journal of experimental criminology. 11, 1, p. 97-115 19 p.

Research output: Contribution to journalArticleAcademicpeer-review

31 Citations (Scopus)

Traditional, Cyber and Combined Bullying Roles: Differences in Risky Online and Offline Activities

Wachs, S., Junger, M. & Sittichai, R., 2015, In : Societies. 5, 1, p. 109-135

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
126 Downloads (Pure)

Treating Child Disruptive Behavior in High-Risk Families: A Comparative Effectiveness Trial from a Community-Based Implementation

Abrahamse, M., Junger, M., van Wouwe, M. A. M. M., Boer, F. & Lindauer, R. J. L., 26 Nov 2015, In : Journal of child and family studies. 25, 5, p. 1605-1622

Research output: Contribution to journalArticleAcademicpeer-review

File
22 Citations (Scopus)
41 Downloads (Pure)
2014

Jeugdcriminaliteit: het belang van vroegtijdig ingrijpen

Junger, M., 2014, In : Spanning. 16, 9, p. 18-19

Research output: Contribution to journalArticleProfessional

File
183 Downloads (Pure)

Prenatal and postnatal preventive interventions based on risk factors

Feder, L. & Junger, M., 2014, Encyclopedia of Criminology and Criminal Justice. Bruinsma, G. & Weisburd, D. (eds.). Springer, p. 3895-3905

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Repeat victimization in cyber space

Junger, M., Wachs, S., Broekman, C. & Lastdrager, E. E. H., 6 Nov 2014, p. -.

Research output: Contribution to conferencePaper

RISK-DET: ICT Security Awareness Aspect Combining Education and Cognitive Sciences

Schaff, G., Harpes, C., Aubigny, M., Junger, M. & Martin, R., 23 Jun 2014, Ninth International Multi-Conference on Computing in the Global Information Technology, ICCGI 2014. Leist, A. & Pankowski, T. (eds.). Wilmington, Delaware: IARIA, 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Targets for Primary Prevention: Cultural, Social and Intrapersonal Factors Associated with Co-occurring Health-related Behaviours

Dusseldorp, E., Klein Velderman, M., Paulussen, T. G. W. M., Junger, M., van Nieuwenhuijzen, M. & Reijneveld, S. A., 13 Jan 2014, In : Psychology & health. 29, 5, p. 598-611

Research output: Contribution to journalArticleAcademicpeer-review

11 Citations (Scopus)
2013

An application to estimate the cyber-risk detection skill of mobile device users

Schaff, G., Harpes, C., Martin, R. & Junger, M., Oct 2013, CENTRIC 2013: The Sixth International Conference on Advances in Human oriented and Personalized Mechanisms, Technologies, and Services. Berntzen, L. & Böhm, S. (eds.). Wilmington, DE: IARIA, p. - 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
108 Downloads (Pure)

Applying the Lost-Letter Technique to Assess IT Risk Behaviour

Lastdrager, E. E. H., Montoya, L., Hartel, P. H. & Junger, M., 10 Jun 2013, Proceedings of the 3rd Workshop on Socio-Technical Aspects in Security and Trust. Piscataway, New Jersey: IEEE Computer Society, p. 2-9 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)

How 'Digital' is Traditional Crime?

Montoya, L., Junger, M. & Hartel, P. H., Jun 2013, European Intelligence and Security Informatics Conference, EISIC 2013. USA: IEEE Computer Society, p. 31-37 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

5 Citations (Scopus)
1 Downloads (Pure)

Jeugdcriminaliteit, het verschil tussen meisjes en jongens

Steketee, M., Junger, M. & Junger-Tas, J., 2013, Criminele meisjes en vrouwen : achtergronden en aanpak. Slotboom, A-M., Hoeve, M., Ezinga, M. & van der Helm, P. (eds.). Den Haag: Boom Lemma, p. 351-380 405 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Modus operandi onderzoek naar door informatie en communicatie technologie (ICT) gefaciliteerde criminaliteit

Junger, M., Montoya, L., Hartel, P. H. & Karemaker, M., Jan 2013, Enschede: Centre for Telematics and Information Technology (CTIT). (CTIT Technical Report Series; no. TR-CTIT-13-07)

Research output: Book/ReportReportOther research output

File
162 Downloads (Pure)

Modus operandi study of information and communication technology (ICT) facilitated crime

Montoya, L., Junger, M. & Hartel, P., 14 Jun 2013, Congresbundel NVC Congres: 13 en 14 juni 2013, Kamerlingh Onnes Gebouw (KOG), Faculteit der Rechtsgeleerdheid, Universiteit Leiden. Leiden, The Netherlands: Nederlandse Vereniging voor Criminologie, p. 93 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

Open Access
File
88 Downloads (Pure)

Offenders in a digitized society

Jansen, J., Junger, M., Montoya, L. & Hartel, P. H., 2013, Cybercrime and the police. Stol, W. P. & Jansen, J. (eds.). The Hague, The Netherlands: Eleven International Publishing, p. 45-59 15 p. (Safety & Security Studies).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

Parental Criminality, Family Violence and Intergenerational Transmission of Crime Within a Birth Cohort

Junger, M., Greene, J., Schipper, R., Hesper, F. & Estourgie, V., 16 Jan 2013, In : European journal on criminal policy and research. 19, 2, p. 117-133 17 p.

Research output: Contribution to journalArticleAcademicpeer-review

25 Citations (Scopus)

Sex differences in the predictors of juvenile delinquency: females are more susceptible to poor environments; males are influenced more by low self-control

Steketee, M., Junger, M. & Junger-Tas, J., 2013, In : Journal of contemporary criminal justice. 29, 1, p. 88-105

Research output: Contribution to journalArticleAcademicpeer-review

13 Citations (Scopus)

Smoking and medication during pregnancy predict repeated unintentional injuries in early childhood but not single unintentional injuries

Junger, M., Japel, C., Cote, S., Xu, Q., Boivin, M. & Tremblay, R. E., 14 Dec 2013, In : Prevention science. 14, 1, p. 13-24 12 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
3 Citations (Scopus)
42 Downloads (Pure)

Wat gaan we doen tegen de cyberaanvallen?

Hartel, P. H., Berg, J. & Junger, M., 2013, In : Informatiebeveiliging. 4, 4, p. 10-11 2 p.

Research output: Contribution to journalArticleProfessional

File
57 Downloads (Pure)