Find Research Outputs

Search in all content

Filters for Research Output

Search concepts
Selected filters

Publication Year

  • 2020
  • 2019
  • 2018
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011

Author

  • Marianne Junger
2020

A Note on Analysing the Attacker Aims Behind DDoS Attacks

Abhishta, A., Junger, M., Joosten, R. & Nieuwenhuis, L. J. M., 1 Jan 2020, Intelligent Distributed Computing XIII, IDC 2019. Kotenko, I., Badica, C., Desnitsky, V., El Baz, D. & Ivanovic, M. (eds.). Springer, p. 255-265 11 p. Chapter 30. (Studies in Computational Intelligence; vol. 868).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
1 Citation (Scopus)
116 Downloads (Pure)

Digital signatures: a tool to prevent and predict dishonesty?

Koning, L., Junger, M. & van Hoof, J., 7 Jul 2020, In : Mind and Society.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
7 Downloads (Pure)
Open Access
File
72 Downloads (Pure)
2019

Cyber-offenders versus traditional offenders: an empirical comparison

Junger, M., 2019, In : Tijdschrift voor criminologie. 61, 1, 6 p.

Research output: Contribution to journalBook/Film/Article reviewAcademic

Open Access
File
34 Downloads (Pure)

Cybersafety Threats - from Deception to Aggression

Benenson, Z., Junger, M., Oliveira, D. & Stringhini, G., Jul 2019.

Research output: Contribution to conferencePaper

Open Access
File
53 Downloads (Pure)

De boer aan het woord: diepte-interviews over het agrarisch ondernemerschap anno 2019

Junger, M., van Hoof, J. J., Koning, L. & Nab, M., 2019, University of Twente.

Research output: Book/ReportReportProfessional

Laptop Theft in a University Setting can be Avoided with Warnings

Nadeem, A. & Junger, M., 18 Jul 2019, ArXiv.

Research output: Working paper

Open Access
File
7 Downloads (Pure)
64 Downloads (Pure)

Psychometric Properties of the Dyadic Parent-Child Interaction Coding System in The Netherlands

Abrahamse, M. E., Niec, L. N., Solomon, D. T., Junger, M. & Lindauer, R. J. L., 16 Jul 2019, In : Child and Family Behavior Therapy. 41, 3, p. 141-158 18 p.

Research output: Contribution to journalArticleAcademicpeer-review

1 Citation (Scopus)
Open Access
File
7 Citations (Scopus)
93 Downloads (Pure)

Teaching Empirical Social-Science Research to Cybersecurity Students: The Case of "Thinking Like a Thief"

Barth, S., Hartel, P. H., Junger, M. & Montoya, L., 14 May 2019, In : IEEE security & privacy. 17, 3, p. 8-16 9 p.

Research output: Contribution to journalArticleAcademicpeer-review

1 Downloads (Pure)

Victim routine influences the number of DDoS attacks: Evidence from Dutch educational network

Abhishta, A., Junger, M., Joosten, R. & Nieuwenhuis, L. J. M., 19 Sep 2019, 2019 IEEE Security and Privacy Workshops, SPW 2019. IEEE, p. 242-247 6 p. 8844620

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)
5 Downloads (Pure)
2018

Computer Science

Hartel, P. H. & Junger, M., 30 Dec 2018, Routledge Handbook of Crime Science: Every new technology brings new opportunity for crime, and information and communication technology (ICT) is no exception. This short article offers students of crime insights in the two main connections between ICT and criminology. On the one hand we show how ICT can be used as a tool, target, or location of crime. On the other hand we show how ICT can be used as a tool to study crime.. Wortley, R., Sidebottom, A., Tilley, N. & Laycock, G. (eds.). 1 ed. London: Routledge, p. 179-189 11 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

47 Downloads (Pure)

Correlates of Mono- and Dual-Victims of Cybergrooming and Cyberbullying: Evidence from Four Countries

Wachs, S., Whittle, H. C., Hamilton-Giachritsis, C., Wolf, K. D., Vazsonyi, A. T. & Junger, M., 1 Feb 2018, In : Cyberpsychology, behavior and social networking. 21, 2, p. 91-98 8 p.

Research output: Contribution to journalArticleAcademicpeer-review

6 Citations (Scopus)

Het succes van social engineering

Bullee, J-W., Montoya, L., Junger, M. & Hartel, P., 2018, In : Tijdschrift voor veiligheid. 17, 1-2, p. 40-53 14 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
215 Downloads (Pure)

On the anatomy of social engineering attacks: A literature-based dissection of successful attacks

Bullée, J-W. H., Montoya, L., Pieters, W., Junger, M. & Hartel, P., Jan 2018, In : Journal of Investigative Psychology and Offender Profiling. 15, 1, p. 20-45 26 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
5 Citations (Scopus)
94 Downloads (Pure)

Parental Self-Control and the Development of Male Aggression in Early Childhood: A Longitudinal Test of Self-Control Theory

Meldrum, R. C., Verhoeven, M., Junger, M., van Aken, M. A. G. & Dekovic, M., 1 Mar 2018, In : International journal of offender therapy and comparative criminology. 62, 4, p. 935-957 23 p.

Research output: Contribution to journalArticleAcademicpeer-review

12 Citations (Scopus)

The influence of the presentation of camera surveillance on cheating and pro-social behavior

Jansen, A. M., Giebels, E., van Rompay, T. J. L. & Junger, M., 16 Oct 2018, In : Frontiers in psychology. 9, OCT, 1937.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
1 Citation (Scopus)
45 Downloads (Pure)

Victims of cybercrime in Europe: a review of victim surveys

Reep-van den Bergh, C. M. M. & Junger, M., 1 Dec 2018, In : Crime science. 7, 1, 15 p., 5.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
8 Citations (Scopus)
102 Downloads (Pure)
2015

Apate: Anti-Phishing Analysing and Triaging Environment (Poster)

Lastdrager, E. E. H., Hartel, P. H. & Junger, M., 18 May 2015, 36th IEEE Symposium on Security and Privacy. Piscataway, New Jersey: IEEE Computer Society, p. - 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
110 Downloads (Pure)

Cultural, social and intrapersonal factors associated with clusters of co-occurring health-related behaviours among adolescents

Klein Velderman, M., Dusseldorp, E., van Nieuwenhuijzen, M., Junger, M., Paulussen, T. G. W. M. & Reijneveld, S. A., 14 May 2015, In : European journal of public health. 25, 1, p. 31-37

Research output: Contribution to journalArticleAcademicpeer-review

File
9 Citations (Scopus)
59 Downloads (Pure)

Parental Mental Health and Self-Control as Predictors of Effortful Control in Young Boys: Mediating Effects of Parenting Behaviors

Karreman, A., van Aken, M., Dekovic, M., Verhoeven, M., Junger, M., van de Beek, C., van Aken, C. & Doreleijers, T. A. H., 19 Mar 2015.

Research output: Contribution to conferencePaper

Psychometric Properties of the Dutch Eyberg Child Behavior Inventory (ECBI) in a Community Sample and a Multi-Ethnic Clinical Sample

Abrahamse, M., Junger, M., Leijten, P. H. O., Boer, F. & Lindauer, R. J. L., 25 Mar 2015, In : Journal of psychopathology and behavioral assessment. 37, 4, p. 679-691

Research output: Contribution to journalArticleAcademicpeer-review

File
18 Citations (Scopus)
60 Downloads (Pure)

Regression Nodes: Extending attack trees with data from social sciences

Bullee, J-W., Montoya, L., Pieters, W., Junger, M. & Hartel, P. H., Jul 2015, Proceedings of the Workshop on Socio-Technical Aspects in Security and Trust (STAST 2015). Piscataway, New Jersey: IEEE Computer Society, p. 17-23 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

Technology-supported Risk Estimation by Predictive Assessment of Socio-technical Security

Coles-Kemp, L., Bullée, J-W., Montoya, L., Junger, M., Heath, C. P., Pieters, W. & Wolos, L., 2015, Trespass Project. 96 p.

Research output: Book/ReportReportProfessional

Open Access
File
13 Downloads (Pure)

The persuasion and security awareness experiment: reducing the success of social engineering attacks

Bullee, J-W., Montoya, L., Pieters, W., Junger, M. & Hartel, P. H., Mar 2015, In : Journal of experimental criminology. 11, 1, p. 97-115 19 p.

Research output: Contribution to journalArticleAcademicpeer-review

31 Citations (Scopus)

Traditional, Cyber and Combined Bullying Roles: Differences in Risky Online and Offline Activities

Wachs, S., Junger, M. & Sittichai, R., 2015, In : Societies. 5, 1, p. 109-135

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
127 Downloads (Pure)

Treating Child Disruptive Behavior in High-Risk Families: A Comparative Effectiveness Trial from a Community-Based Implementation

Abrahamse, M., Junger, M., van Wouwe, M. A. M. M., Boer, F. & Lindauer, R. J. L., 26 Nov 2015, In : Journal of child and family studies. 25, 5, p. 1605-1622

Research output: Contribution to journalArticleAcademicpeer-review

File
23 Citations (Scopus)
42 Downloads (Pure)
2014

Jeugdcriminaliteit: het belang van vroegtijdig ingrijpen

Junger, M., 2014, In : Spanning. 16, 9, p. 18-19

Research output: Contribution to journalArticleProfessional

File
188 Downloads (Pure)

Prenatal and postnatal preventive interventions based on risk factors

Feder, L. & Junger, M., 2014, Encyclopedia of Criminology and Criminal Justice. Bruinsma, G. & Weisburd, D. (eds.). Springer, p. 3895-3905

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Repeat victimization in cyber space

Junger, M., Wachs, S., Broekman, C. & Lastdrager, E. E. H., 6 Nov 2014, p. -.

Research output: Contribution to conferencePaper

RISK-DET: ICT Security Awareness Aspect Combining Education and Cognitive Sciences

Schaff, G., Harpes, C., Aubigny, M., Junger, M. & Martin, R., 23 Jun 2014, Ninth International Multi-Conference on Computing in the Global Information Technology, ICCGI 2014. Leist, A. & Pankowski, T. (eds.). Wilmington, Delaware: IARIA, 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Targets for Primary Prevention: Cultural, Social and Intrapersonal Factors Associated with Co-occurring Health-related Behaviours

Dusseldorp, E., Klein Velderman, M., Paulussen, T. G. W. M., Junger, M., van Nieuwenhuijzen, M. & Reijneveld, S. A., 13 Jan 2014, In : Psychology & health. 29, 5, p. 598-611

Research output: Contribution to journalArticleAcademicpeer-review

11 Citations (Scopus)
2013

An application to estimate the cyber-risk detection skill of mobile device users

Schaff, G., Harpes, C., Martin, R. & Junger, M., Oct 2013, CENTRIC 2013: The Sixth International Conference on Advances in Human oriented and Personalized Mechanisms, Technologies, and Services. Berntzen, L. & Böhm, S. (eds.). Wilmington, DE: IARIA, p. - 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
111 Downloads (Pure)

Applying the Lost-Letter Technique to Assess IT Risk Behaviour

Lastdrager, E. E. H., Montoya, L., Hartel, P. H. & Junger, M., 10 Jun 2013, Proceedings of the 3rd Workshop on Socio-Technical Aspects in Security and Trust. Piscataway, New Jersey: IEEE Computer Society, p. 2-9 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)

How 'Digital' is Traditional Crime?

Montoya, L., Junger, M. & Hartel, P. H., Jun 2013, European Intelligence and Security Informatics Conference, EISIC 2013. USA: IEEE Computer Society, p. 31-37 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

5 Citations (Scopus)
1 Downloads (Pure)

Jeugdcriminaliteit, het verschil tussen meisjes en jongens

Steketee, M., Junger, M. & Junger-Tas, J., 2013, Criminele meisjes en vrouwen : achtergronden en aanpak. Slotboom, A-M., Hoeve, M., Ezinga, M. & van der Helm, P. (eds.). Den Haag: Boom Lemma, p. 351-380 405 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Modus operandi onderzoek naar door informatie en communicatie technologie (ICT) gefaciliteerde criminaliteit

Junger, M., Montoya, L., Hartel, P. H. & Karemaker, M., Jan 2013, Enschede: Centre for Telematics and Information Technology (CTIT). (CTIT Technical Report Series; no. TR-CTIT-13-07)

Research output: Book/ReportReportOther research output

File
168 Downloads (Pure)

Modus operandi study of information and communication technology (ICT) facilitated crime

Montoya, L., Junger, M. & Hartel, P., 14 Jun 2013, Congresbundel NVC Congres: 13 en 14 juni 2013, Kamerlingh Onnes Gebouw (KOG), Faculteit der Rechtsgeleerdheid, Universiteit Leiden. Leiden, The Netherlands: Nederlandse Vereniging voor Criminologie, p. 93 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

Open Access
File
95 Downloads (Pure)

Offenders in a digitized society

Jansen, J., Junger, M., Montoya, L. & Hartel, P. H., 2013, Cybercrime and the police. Stol, W. P. & Jansen, J. (eds.). The Hague, The Netherlands: Eleven International Publishing, p. 45-59 15 p. (Safety & Security Studies).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

Parental Criminality, Family Violence and Intergenerational Transmission of Crime Within a Birth Cohort

Junger, M., Greene, J., Schipper, R., Hesper, F. & Estourgie, V., 16 Jan 2013, In : European journal on criminal policy and research. 19, 2, p. 117-133 17 p.

Research output: Contribution to journalArticleAcademicpeer-review

25 Citations (Scopus)

Sex differences in the predictors of juvenile delinquency: females are more susceptible to poor environments; males are influenced more by low self-control

Steketee, M., Junger, M. & Junger-Tas, J., 2013, In : Journal of contemporary criminal justice. 29, 1, p. 88-105

Research output: Contribution to journalArticleAcademicpeer-review

14 Citations (Scopus)
1 Downloads (Pure)

Smoking and medication during pregnancy predict repeated unintentional injuries in early childhood but not single unintentional injuries

Junger, M., Japel, C., Cote, S., Xu, Q., Boivin, M. & Tremblay, R. E., 14 Dec 2013, In : Prevention science. 14, 1, p. 13-24 12 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
3 Citations (Scopus)
42 Downloads (Pure)

Wat gaan we doen tegen de cyberaanvallen?

Hartel, P. H., Berg, J. & Junger, M., 2013, In : Informatiebeveiliging. 4, 4, p. 10-11 2 p.

Research output: Contribution to journalArticleProfessional

File
59 Downloads (Pure)

Zusammenhänge zwischen Cybergrooming, Sexting und Cyberbullying bei 11 – 13-Jährigen: Erste Ergebnisse einer internationalen Selbstberichtsstudie

Wachs, S., Wolf, K. D., Junger, M. & Sittichai, R., 7 Nov 2013. 2 p.

Research output: Contribution to conferencePaper

Zusammenhänge zwischen Cybergrooming, Sexting und Cyberbullying bei 11-13 Jährigen: Erste Ergebnisse einer internationalen Selbstberichtsstudie.

Wachs, S., Wolf, K. D., Junger, M. & Sittichai, R., 2013, p. -.

Research output: Contribution to conferencePoster

2012

Clustering of health and risk behaviour in immigrant and indigenous Dutch residents aged 19-40 years.

Reijneveld, S. A., van Nieuwenhuijzen, M., Klein Velderman, M., Paulussen, T. G. W. M. & Junger, M., 2012, In : International journal of public health. 57, 2, p. 351-361 11 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
9 Citations (Scopus)
62 Downloads (Pure)

Crime science: editorial statement

Junger, M., Laycock, G., Hartel, P. H. & Ratcliffe, J., 11 Jun 2012, In : Crime science. 1, 1, 3 p., 1.

Research output: Contribution to journalArticleAcademic

Open Access
File
13 Downloads (Pure)

New Directions in the study of the relations between parenting and externalizing behaviors in toddlerhood

van Aken, C., Junger, M., Verhoeven, M., van Aken, M. A. G. & Dekovic, M., 2012, Child development and child poverty. Fiedler, A. & Kuester, I. (eds.). New York, NJ, USA: Nova Science, p. 155-176 (Children's Issues, Laws and Programs).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

New opportunities in the digital age: mobile phone ownership, usage and truancy by high school students

Junger, M., Ottenhof, R. H. J. & Hartel, P. H., 2012, KLM Van Dijk: Liber Amicorum prof.dr.mr. J.J.M. van Dijk. Groenhuijsen, M., Letschert, R. & Hazenbroek, S. (eds.). Nijmegen: Wolf Legal Publishers, p. 191-206

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

File
14 Downloads (Pure)