Find Research Outputs

Search in all content

Filters for Research Output

Search concepts
Selected filters

Publication Year

  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2014
  • 2013
  • 2012
  • 2011

Author

  • Marianne Junger
2020

A Note on Analysing the Attacker Aims Behind DDoS Attacks

Abhishta, A., Junger, M., Joosten, R. & Nieuwenhuis, L. J. M., 1 Jan 2020, Intelligent Distributed Computing XIII, IDC 2019. Kotenko, I., Badica, C., Desnitsky, V., El Baz, D. & Ivanovic, M. (eds.). Springer, p. 255-265 11 p. Chapter 30. (Studies in Computational Intelligence; vol. 868).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
1 Citation (Scopus)
105 Downloads (Pure)

Digital signatures: a tool to prevent and predict dishonesty?

Koning, L., Junger, M. & van Hoof, J., 7 Jul 2020, In : Mind and Society.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
5 Downloads (Pure)
Open Access
File
52 Downloads (Pure)
2019

Cyber-offenders versus traditional offenders: an empirical comparison

Junger, M., 2019, In : Tijdschrift voor criminologie. 61, 1, 6 p.

Research output: Contribution to journalBook/Film/Article reviewAcademic

Open Access
File
25 Downloads (Pure)

Cybersafety Threats - from Deception to Aggression

Benenson, Z., Junger, M., Oliveira, D. & Stringhini, G., Jul 2019.

Research output: Contribution to conferencePaperAcademicpeer-review

Open Access
File
31 Downloads (Pure)

De boer aan het woord: diepte-interviews over het agrarisch ondernemerschap anno 2019

Junger, M., van Hoof, J. J., Koning, L. & Nab, M., 2019, University of Twente.

Research output: Book/ReportReportProfessional

Laptop Theft in a University Setting can be Avoided with Warnings

Nadeem, A. & Junger, M., 18 Jul 2019, ArXiv.

Research output: Working paper

Open Access
File
7 Downloads (Pure)
61 Downloads (Pure)

Psychometric Properties of the Dyadic Parent-Child Interaction Coding System in The Netherlands

Abrahamse, M. E., Niec, L. N., Solomon, D. T., Junger, M. & Lindauer, R. J. L., 16 Jul 2019, In : Child and Family Behavior Therapy. 41, 3, p. 141-158 18 p.

Research output: Contribution to journalArticleAcademicpeer-review

1 Citation (Scopus)
Open Access
File
6 Citations (Scopus)
92 Downloads (Pure)

Teaching Empirical Social-Science Research to Cybersecurity Students: The Case of "Thinking Like a Thief"

Barth, S., Hartel, P. H., Junger, M. & Montoya, L., 14 May 2019, In : IEEE security & privacy. 17, 3, p. 8-16 9 p.

Research output: Contribution to journalArticleAcademicpeer-review

1 Downloads (Pure)

Victim routine influences the number of DDoS attacks: Evidence from Dutch educational network

Abhishta, A., Junger, M., Joosten, R. & Nieuwenhuis, L. J. M., 19 Sep 2019, 2019 IEEE Security and Privacy Workshops, SPW 2019. IEEE, p. 242-247 6 p. 8844620

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)
4 Downloads (Pure)
2018

Computer Science

Hartel, P. H. & Junger, M., 30 Dec 2018, Routledge Handbook of Crime Science: Every new technology brings new opportunity for crime, and information and communication technology (ICT) is no exception. This short article offers students of crime insights in the two main connections between ICT and criminology. On the one hand we show how ICT can be used as a tool, target, or location of crime. On the other hand we show how ICT can be used as a tool to study crime.. Wortley, R., Sidebottom, A., Tilley, N. & Laycock, G. (eds.). 1 ed. London: Routledge, p. 179-189 11 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

44 Downloads (Pure)

Correlates of Mono- and Dual-Victims of Cybergrooming and Cyberbullying: Evidence from Four Countries

Wachs, S., Whittle, H. C., Hamilton-Giachritsis, C., Wolf, K. D., Vazsonyi, A. T. & Junger, M., 1 Feb 2018, In : Cyberpsychology, behavior and social networking. 21, 2, p. 91-98 8 p.

Research output: Contribution to journalArticleAcademicpeer-review

6 Citations (Scopus)

Het succes van social engineering

Bullee, J-W., Montoya, L., Junger, M. & Hartel, P., 2018, In : Tijdschrift voor veiligheid. 17, 1-2, p. 40-53 14 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
199 Downloads (Pure)

On the anatomy of social engineering attacks: A literature-based dissection of successful attacks

Bullée, J-W. H., Montoya, L., Pieters, W., Junger, M. & Hartel, P., Jan 2018, In : Journal of Investigative Psychology and Offender Profiling. 15, 1, p. 20-45 26 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
5 Citations (Scopus)
91 Downloads (Pure)

Parental Self-Control and the Development of Male Aggression in Early Childhood: A Longitudinal Test of Self-Control Theory

Meldrum, R. C., Verhoeven, M., Junger, M., van Aken, M. A. G. & Dekovic, M., 1 Mar 2018, In : International journal of offender therapy and comparative criminology. 62, 4, p. 935-957 23 p.

Research output: Contribution to journalArticleAcademicpeer-review

12 Citations (Scopus)

The influence of the presentation of camera surveillance on cheating and pro-social behavior

Jansen, A. M., Giebels, E., van Rompay, T. J. L. & Junger, M., 16 Oct 2018, In : Frontiers in psychology. 9, OCT, 1937.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
1 Citation (Scopus)
44 Downloads (Pure)

Victims of cybercrime in Europe: a review of victim surveys

Reep-van den Bergh, C. M. M. & Junger, M., 1 Dec 2018, In : Crime science. 7, 1, 15 p., 5.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
8 Citations (Scopus)
88 Downloads (Pure)

How Effective is Anti-Phishing Training for Children? (Distinguished Paper Award)

Lastdrager, E. E. H., Carvajal Gallardo, I. R., Hartel, P. H. & Junger, M., 14 Jul 2017, Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association, p. 229-239 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
25 Downloads (Pure)

Order and control in the environment: Exploring the effects on undesired behaviour and the importance of locus of control

Jansen, A. M., Giebels, E., van Rompay, T. J. L., Austrup, S. & Junger, M., Sep 2017, In : Legal and criminological psychology. 22, 2, p. 213-227

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
341 Downloads (Pure)

Priming and warnings are not effective to prevent social engineering attacks

Junger, M., Montoya, L. & Overink, F. J., 2017, In : Computers in human behavior. 66, p. 75-87 13 p.

Research output: Contribution to journalArticleAcademicpeer-review

39 Citations (Scopus)
1 Downloads (Pure)

Spear phishing in organisations explained

Bullee, J-W., Montoya, L., Junger, M. & Hartel, P., Jul 2017, In : Information and Computer Security. 25, 5, p. 593-613 21 p.

Research output: Contribution to journalArticleAcademicpeer-review

12 Citations (Scopus)
1 Downloads (Pure)

The role of self-control and cognitive functioning in educational inequalities in adolescent smoking and binge drinking

Davies, L. E. M., Kuipers, M. A. G., Junger, M. & Kunst, A. E., 16 Sep 2017, In : BMC public health. 17, 9 p., 714.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
3 Citations (Scopus)
62 Downloads (Pure)

Towards the normalization of cybercrime victimization: A routine activities analysis of cybercrime in europe

Junger, M., Montoya, L., Hartel, P. H. & Heydari, M., 19 Oct 2017, 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA). IEEE

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)
2016

A cross-national study of direct and indirect effects of cyberbullying on cybergrooming victimization via self-esteem

Wachs, S., Jiskrova, G. K., Vazsonyi, A. T., Wolf, K. D. & Junger, M., 2 Mar 2016, In : Psicologia educativa. 22, 1, p. 61-70

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
20 Citations (Scopus)
89 Downloads (Pure)

Book review: Crime and Everyday Life by Marcus Felson and Mary Eckert, 5th edition

Hartel, P. H. & Junger, M., 9 Aug 2016, In : Crime science. 5, 10, p. 10:1-10:3 3 p.

Research output: Contribution to journalBook/Film/Article reviewAcademic

Open Access
File
41 Downloads (Pure)

Risk factors for attrition from an evidence-based parenting program: Findings from the Netherlands

Abrahamse, M., Niec, L. N., Junger, M., Boer, F. & Lindauer, R. J. L., 2016, In : Children and youth services review. 64, p. 42-50

Research output: Contribution to journalArticleAcademicpeer-review

12 Citations (Scopus)

Slachtofferschap bij cybercrime: pilotonderzoek

Junger, M., Wiegersma, S., de Vries, T. & Veldkamp, B. P., 2016, Enschede: Universiteit Twente.

Research output: Book/ReportReportProfessional

Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention

Bullee, J-W., Montoya, L., Junger, M. & Hartel, P. H., Jan 2016, Proceedings of the inaugural Singapore Cyber Security R&D Conference (SG-CRC 2016). Mathur, A. & Roychoudhury, A. (eds.). Amsterdam: IOS Press, p. 107-114 6 p. (Cryptology and Information Security Series; vol. 14).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
9 Citations (Scopus)
254 Downloads (Pure)

The Relation Between Residential Property and its Surroundings and Day- and Night-Time Residential Burglary

Montoya, L., Junger, M. & Ongena, Y., Apr 2016, In : Environment and behavior. 48, 4, p. 515-549 35 p.

Research output: Contribution to journalArticleAcademicpeer-review

22 Citations (Scopus)
2014

Jeugdcriminaliteit: het belang van vroegtijdig ingrijpen

Junger, M., 2014, In : Spanning. 16, 9, p. 18-19

Research output: Contribution to journalArticleProfessional

File
183 Downloads (Pure)

Prenatal and postnatal preventive interventions based on risk factors

Feder, L. & Junger, M., 2014, Encyclopedia of Criminology and Criminal Justice. Bruinsma, G. & Weisburd, D. (eds.). Springer, p. 3895-3905

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Repeat victimization in cyber space

Junger, M., Wachs, S., Broekman, C. & Lastdrager, E. E. H., 6 Nov 2014, p. -.

Research output: Contribution to conferencePaper

RISK-DET: ICT Security Awareness Aspect Combining Education and Cognitive Sciences

Schaff, G., Harpes, C., Aubigny, M., Junger, M. & Martin, R., 23 Jun 2014, Ninth International Multi-Conference on Computing in the Global Information Technology, ICCGI 2014. Leist, A. & Pankowski, T. (eds.). Wilmington, Delaware: IARIA, 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Targets for Primary Prevention: Cultural, Social and Intrapersonal Factors Associated with Co-occurring Health-related Behaviours

Dusseldorp, E., Klein Velderman, M., Paulussen, T. G. W. M., Junger, M., van Nieuwenhuijzen, M. & Reijneveld, S. A., 13 Jan 2014, In : Psychology & health. 29, 5, p. 598-611

Research output: Contribution to journalArticleAcademicpeer-review

11 Citations (Scopus)
2013

An application to estimate the cyber-risk detection skill of mobile device users

Schaff, G., Harpes, C., Martin, R. & Junger, M., Oct 2013, CENTRIC 2013: The Sixth International Conference on Advances in Human oriented and Personalized Mechanisms, Technologies, and Services. Berntzen, L. & Böhm, S. (eds.). Wilmington, DE: IARIA, p. - 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
108 Downloads (Pure)

Applying the Lost-Letter Technique to Assess IT Risk Behaviour

Lastdrager, E. E. H., Montoya, L., Hartel, P. H. & Junger, M., 10 Jun 2013, Proceedings of the 3rd Workshop on Socio-Technical Aspects in Security and Trust. Piscataway, New Jersey: IEEE Computer Society, p. 2-9 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)

How 'Digital' is Traditional Crime?

Montoya, L., Junger, M. & Hartel, P. H., Jun 2013, European Intelligence and Security Informatics Conference, EISIC 2013. USA: IEEE Computer Society, p. 31-37 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

5 Citations (Scopus)
1 Downloads (Pure)

Jeugdcriminaliteit, het verschil tussen meisjes en jongens

Steketee, M., Junger, M. & Junger-Tas, J., 2013, Criminele meisjes en vrouwen : achtergronden en aanpak. Slotboom, A-M., Hoeve, M., Ezinga, M. & van der Helm, P. (eds.). Den Haag: Boom Lemma, p. 351-380 405 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Modus operandi onderzoek naar door informatie en communicatie technologie (ICT) gefaciliteerde criminaliteit

Junger, M., Montoya, L., Hartel, P. H. & Karemaker, M., Jan 2013, Enschede: Centre for Telematics and Information Technology (CTIT). (CTIT Technical Report Series; no. TR-CTIT-13-07)

Research output: Book/ReportReportOther research output

File
162 Downloads (Pure)

Modus operandi study of information and communication technology (ICT) facilitated crime

Montoya, L., Junger, M. & Hartel, P., 14 Jun 2013, Congresbundel NVC Congres: 13 en 14 juni 2013, Kamerlingh Onnes Gebouw (KOG), Faculteit der Rechtsgeleerdheid, Universiteit Leiden. Leiden, The Netherlands: Nederlandse Vereniging voor Criminologie, p. 93 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

Open Access
File
88 Downloads (Pure)

Offenders in a digitized society

Jansen, J., Junger, M., Montoya, L. & Hartel, P. H., 2013, Cybercrime and the police. Stol, W. P. & Jansen, J. (eds.). The Hague, The Netherlands: Eleven International Publishing, p. 45-59 15 p. (Safety & Security Studies).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

Parental Criminality, Family Violence and Intergenerational Transmission of Crime Within a Birth Cohort

Junger, M., Greene, J., Schipper, R., Hesper, F. & Estourgie, V., 16 Jan 2013, In : European journal on criminal policy and research. 19, 2, p. 117-133 17 p.

Research output: Contribution to journalArticleAcademicpeer-review

25 Citations (Scopus)

Sex differences in the predictors of juvenile delinquency: females are more susceptible to poor environments; males are influenced more by low self-control

Steketee, M., Junger, M. & Junger-Tas, J., 2013, In : Journal of contemporary criminal justice. 29, 1, p. 88-105

Research output: Contribution to journalArticleAcademicpeer-review

13 Citations (Scopus)

Smoking and medication during pregnancy predict repeated unintentional injuries in early childhood but not single unintentional injuries

Junger, M., Japel, C., Cote, S., Xu, Q., Boivin, M. & Tremblay, R. E., 14 Dec 2013, In : Prevention science. 14, 1, p. 13-24 12 p.

Research output: Contribution to journalArticleAcademicpeer-review

File
3 Citations (Scopus)
42 Downloads (Pure)

Wat gaan we doen tegen de cyberaanvallen?

Hartel, P. H., Berg, J. & Junger, M., 2013, In : Informatiebeveiliging. 4, 4, p. 10-11 2 p.

Research output: Contribution to journalArticleProfessional

File
57 Downloads (Pure)

Zusammenhänge zwischen Cybergrooming, Sexting und Cyberbullying bei 11 – 13-Jährigen: Erste Ergebnisse einer internationalen Selbstberichtsstudie

Wachs, S., Wolf, K. D., Junger, M. & Sittichai, R., 7 Nov 2013. 2 p.

Research output: Contribution to conferencePaper

Zusammenhänge zwischen Cybergrooming, Sexting und Cyberbullying bei 11-13 Jährigen: Erste Ergebnisse einer internationalen Selbstberichtsstudie.

Wachs, S., Wolf, K. D., Junger, M. & Sittichai, R., 2013, p. -.

Research output: Contribution to conferencePoster