Search concepts
|
Selected filters |
- 1 - 50 out of 55 results
- Export search results
Search results
-
Working paper
Characteristics of DDoS attacks: An analysis of the most reported attack events of 2016
Abhishta, A., Nieuwenhuis, L. J. M., Junger, M. & Joosten, R. A. M. G., 2017.Research output: Working paper
-
Laptop Theft in a University Setting can be Avoided with Warnings
Nadeem, A. & Junger, M., 18 Jul 2019, ArXiv.Research output: Working paper
Open AccessFile9 Downloads (Pure) -
Review article
How effective are social engineering interventions? A meta-analysis
Bullee, J. W. & Junger, M., 5 Aug 2020, In : Information and Computer Security. 28, 5, p. 801-830 30 p.Research output: Contribution to journal › Review article › Academic › peer-review
-
Report
De boer aan het woord: diepte-interviews over het agrarisch ondernemerschap anno 2019
Junger, M., van Hoof, J. J., Koning, L. & Nab, M., 2019, University of Twente.Research output: Book/Report › Report › Professional
-
Project 'Nudging and improved form design': Evaluatie van formulier aanvullende gegevens: De functie voor en het gebruik door agrarisch ondernemers
Junger, M., van Hoof, J. J., Koning, L. & Nab, M., 27 May 2019Research output: Book/Report › Report › Professional
Open AccessFile92 Downloads (Pure) -
Slachtofferschap bij cybercrime: pilotonderzoek
Junger, M., Wiegersma, S., de Vries, T. & Veldkamp, B. P., 2016, Enschede: Universiteit Twente.Research output: Book/Report › Report › Professional
-
Teaching Engineering students to "Think thief"
Hartel, P. H. & Junger, M., Jul 2012, Enschede: Centre for Telematics and Information Technology (CTIT). 12 p. (CTIT Technical Report Series; no. TR-CTIT-12-19)Research output: Book/Report › Report › Professional
File164 Downloads (Pure) -
Teaching Information Security Students to "Think thief"
Hartel, P. H. & Junger, M., 2012, Enschede, The Netherlands: Universiteit Twente. 7 p. (CTIT technical report; no. 12-19)Research output: Book/Report › Report › Professional
File35 Downloads (Pure) -
Technology-supported Risk Estimation by Predictive Assessment of Socio-technical Security
Coles-Kemp, L., Bullée, J-W., Montoya, L., Junger, M., Heath, C. P., Pieters, W. & Wolos, L., 2015, Trespass Project. 96 p.Research output: Book/Report › Report › Professional
Open AccessFile16 Downloads (Pure) -
Paper
Cybersafety Threats - from Deception to Aggression
Benenson, Z., Junger, M., Oliveira, D. & Stringhini, G., Jul 2019.Research output: Contribution to conference › Paper › Academic › peer-review
Open AccessFile102 Downloads (Pure) -
Parental Mental Health and Self-Control as Predictors of Effortful Control in Young Boys: Mediating Effects of Parenting Behaviors
Karreman, A., van Aken, M., Dekovic, M., Verhoeven, M., Junger, M., van de Beek, C., van Aken, C. & Doreleijers, T. A. H., 19 Mar 2015.Research output: Contribution to conference › Paper › Academic
-
Repeat victimization in cyber space
Junger, M., Wachs, S., Broekman, C. & Lastdrager, E. E. H., 6 Nov 2014, p. -.Research output: Contribution to conference › Paper › Academic
-
What is convergence in time and space for cyber crime?
Hartel, P. & Junger, M., 28 Mar 2011, p. -.Research output: Contribution to conference › Paper › Academic
-
Conference contribution
A Note on Analysing the Attacker Aims Behind DDoS Attacks
Abhishta, A., Junger, M., Joosten, R. & Nieuwenhuis, L. J. M., 1 Jan 2020, Intelligent Distributed Computing XIII, IDC 2019. Kotenko, I., Badica, C., Desnitsky, V., El Baz, D. & Ivanovic, M. (eds.). Springer, p. 255-265 11 p. Chapter 30. (Studies in Computational Intelligence; vol. 868).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
Open AccessFile1 Citation (Scopus)148 Downloads (Pure) -
Apate: Anti-Phishing Analysing and Triaging Environment (Poster)
Lastdrager, E. E. H., Hartel, P. H. & Junger, M., 18 May 2015, 36th IEEE Symposium on Security and Privacy. Piscataway, New Jersey: IEEE Computer Society, p. - 2 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
File113 Downloads (Pure) -
How Effective is Anti-Phishing Training for Children? (Distinguished Paper Award)
Lastdrager, E. E. H., Carvajal Gallardo, I. R., Hartel, P. H. & Junger, M., 14 Jul 2017, Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association, p. 229-239 11 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
Open AccessFile29 Downloads (Pure) -
Regression Nodes: Extending attack trees with data from social sciences
Bullee, J-W., Montoya, L., Pieters, W., Junger, M. & Hartel, P. H., Jul 2015, Proceedings of the Workshop on Socio-Technical Aspects in Security and Trust (STAST 2015). Piscataway, New Jersey: IEEE Computer Society, p. 17-23 7 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
2 Citations (Scopus) -
RISK-DET: ICT Security Awareness Aspect Combining Education and Cognitive Sciences
Schaff, G., Harpes, C., Aubigny, M., Junger, M. & Martin, R., 23 Jun 2014, Ninth International Multi-Conference on Computing in the Global Information Technology, ICCGI 2014. Leist, A. & Pankowski, T. (eds.). Wilmington, Delaware: IARIA, 3 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
-
Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention
Bullee, J-W., Montoya, L., Junger, M. & Hartel, P. H., Jan 2016, Proceedings of the inaugural Singapore Cyber Security R&D Conference (SG-CRC 2016). Mathur, A. & Roychoudhury, A. (eds.). Amsterdam: IOS Press, p. 107-114 6 p. (Cryptology and Information Security Series; vol. 14).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
File9 Citations (Scopus)311 Downloads (Pure) -
Towards the normalization of cybercrime victimization: A routine activities analysis of cybercrime in europe
Junger, M., Montoya, L., Hartel, P. H. & Heydari, M., 19 Oct 2017, 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA). IEEEResearch output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
4 Citations (Scopus) -
Victim routine influences the number of DDoS attacks: Evidence from Dutch educational network
Abhishta, A., Junger, M., Joosten, R. & Nieuwenhuis, L. J. M., 19 Sep 2019, 2019 IEEE Security and Privacy Workshops, SPW 2019. IEEE, p. 242-247 6 p. 8844620Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
1 Citation (Scopus)5 Downloads (Pure) -
Chapter
New Directions in the study of the relations between parenting and externalizing behaviors in toddlerhood
van Aken, C., Junger, M., Verhoeven, M., van Aken, M. A. G. & Dekovic, M., 2012, Child development and child poverty. Fiedler, A. & Kuester, I. (eds.). New York, NJ, USA: Nova Science, p. 155-176 (Children's Issues, Laws and Programs).Research output: Chapter in Book/Report/Conference proceeding › Chapter › Academic › peer-review
-
New opportunities in the digital age: mobile phone ownership, usage and truancy by high school students
Junger, M., Ottenhof, R. H. J. & Hartel, P. H., Dec 2012, KLM Van Dijk : Liber Amicorum prof.dr.mr. J.J.M. van Dijk. Groenhuijsen, M., Letschert, R. & Hazenbroek, S. (eds.). Nijmegen: Wolf Legal Publishers, p. 191-206 16 p.Research output: Chapter in Book/Report/Conference proceeding › Chapter › Academic
File36 Downloads (Pure) -
New opportunities in the digital age: mobile phone ownership, usage and truancy by high school students
Junger, M., Ottenhof, R. H. J. & Hartel, P. H., 2012, KLM Van Dijk: Liber Amicorum prof.dr.mr. J.J.M. van Dijk. Groenhuijsen, M., Letschert, R. & Hazenbroek, S. (eds.). Nijmegen: Wolf Legal Publishers, p. 191-206Research output: Chapter in Book/Report/Conference proceeding › Chapter › Academic
File17 Downloads (Pure) -
Prenatal and postnatal preventive interventions based on risk factors
Feder, L. & Junger, M., 2014, Encyclopedia of Criminology and Criminal Justice. Bruinsma, G. & Weisburd, D. (eds.). Springer, p. 3895-3905Research output: Chapter in Book/Report/Conference proceeding › Chapter › Academic › peer-review
-
Social engineering
Bullée, J. W. & Junger, M., 6 Jun 2020, The Palgrave Handbook of International Cybercrime and Cyberdeviance. Holt, T. J. & Bossler, A. M. (eds.). Palgrave Macmillan Ltd., p. 849-875 27 p.Research output: Chapter in Book/Report/Conference proceeding › Chapter › Academic › peer-review
-
Book editing
Actuele Criminologie
Dijk, J. J. M. V., Junger, M. & Sagel-grande, I., 2011, Den Haag: SDU. 384 p.Research output: Book/Report › Book editing › Popular
-
Book/Film/Article review
Book review: Crime and Everyday Life by Marcus Felson and Mary Eckert, 5th edition
Hartel, P. H. & Junger, M., 9 Aug 2016, In : Crime science. 5, 10, p. 10:1-10:3 3 p.Research output: Contribution to journal › Book/Film/Article review › Academic
Open AccessFile -
Cyber-offenders versus traditional offenders: an empirical comparison
Junger, M., 2019, In : Tijdschrift voor criminologie. 61, 1, 6 p.Research output: Contribution to journal › Book/Film/Article review › Academic
Open AccessFile -
Article
A cross-national study of direct and indirect effects of cyberbullying on cybergrooming victimization via self-esteem
Wachs, S., Jiskrova, G. K., Vazsonyi, A. T., Wolf, K. D. & Junger, M., 2 Mar 2016, In : Psicologia educativa. 22, 1, p. 61-70Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile21 Citations (Scopus)99 Downloads (Pure) -
Clustering of health and risk behaviour in immigrant and indigenous Dutch residents aged 19-40 years.
Reijneveld, S. A., van Nieuwenhuijzen, M., Klein Velderman, M., Paulussen, T. G. W. M. & Junger, M., 2012, In : International journal of public health. 57, 2, p. 351-361 11 p.Research output: Contribution to journal › Article › Academic › peer-review
File10 Citations (Scopus)72 Downloads (Pure) -
Crime science: editorial statement
Junger, M., Laycock, G., Hartel, P. H. & Ratcliffe, J., 11 Jun 2012, In : Crime science. 1, 1, 3 p., 1.Research output: Contribution to journal › Article › Academic
Open AccessFile -
Cultural, social and intrapersonal factors associated with clusters of co-occurring health-related behaviours among adolescents
Klein Velderman, M., Dusseldorp, E., van Nieuwenhuijzen, M., Junger, M., Paulussen, T. G. W. M. & Reijneveld, S. A., 14 May 2015, In : European journal of public health. 25, 1, p. 31-37Research output: Contribution to journal › Article › Academic › peer-review
File9 Citations (Scopus)65 Downloads (Pure) -
Der Einfluss von Bebauung und Nachbarschaft auf das Einbruchrisiko
Lorei, C. (ed.), Montoya, L., Ongena, Y. & Junger, M., 2011, In : Polizei und Wissenschaft. 2011, 3, p. 43-57 17 p.Research output: Contribution to journal › Article › Academic
-
Digital signatures: a tool to prevent and predict dishonesty?
Koning, L., Junger, M. & van Hoof, J., Nov 2020, In : Mind and Society. 19, 2, p. 257-285 29 p.Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile -
Fraud against businesses both online and offline: Crime scripts, business characteristics, efforts, and benefits
Junger, M., Wang, V. & Schlömer, M., 9 Jul 2020, In : Crime science. 9, 1, 13.Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile -
Jeugdcriminaliteit: het belang van vroegtijdig ingrijpen
Junger, M., 2014, In : Spanning. 16, 9, p. 18-19Research output: Contribution to journal › Article › Professional
File211 Downloads (Pure) -
Order and control in the environment: Exploring the effects on undesired behaviour and the importance of locus of control
Jansen, A. M., Giebels, E., van Rompay, T. J. L., Austrup, S. & Junger, M., Sep 2017, In : Legal and criminological psychology. 22, 2, p. 213-227Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile -
Parent-child interaction therapy for preschool children with disruptive behaviour problems in the Netherlands
Abrahamse, M. E., Junger, M., Chavannes, E. L., Coelman, F. J. G., Boer, F. & Lindauer, R. J. L., 2012, In : Child and adolescent psychiatry and mental health. 6, 24, 9 p., 24.Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile29 Citations (Scopus)75 Downloads (Pure) -
Priming and warnings are not effective to prevent social engineering attacks
Junger, M., Montoya, L. & Overink, F. J., 2017, In : Computers in human behavior. 66, p. 75-87 13 p.Research output: Contribution to journal › Article › Academic › peer-review
45 Citations (Scopus)1 Downloads (Pure) -
Psychometric Properties of the Dutch Eyberg Child Behavior Inventory (ECBI) in a Community Sample and a Multi-Ethnic Clinical Sample
Abrahamse, M., Junger, M., Leijten, P. H. O., Boer, F. & Lindauer, R. J. L., 25 Mar 2015, In : Journal of psychopathology and behavioral assessment. 37, 4, p. 679-691Research output: Contribution to journal › Article › Academic › peer-review
File19 Citations (Scopus)65 Downloads (Pure) -
Psychometric Properties of the Dyadic Parent-Child Interaction Coding System in The Netherlands
Abrahamse, M. E., Niec, L. N., Solomon, D. T., Junger, M. & Lindauer, R. J. L., 16 Jul 2019, In : Child and Family Behavior Therapy. 41, 3, p. 141-158 18 p.Research output: Contribution to journal › Article › Academic › peer-review
1 Citation (Scopus) -
Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources
Barth, S., de Jong, M. D. T., Junger, M., Hartel, P. H. & Roppelt, J. C., 1 Aug 2019, In : Telematics and informatics. 41, p. 55-69 15 p.Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile14 Citations (Scopus)118 Downloads (Pure) -
Risk factors for attrition from an evidence-based parenting program: Findings from the Netherlands
Abrahamse, M., Niec, L. N., Junger, M., Boer, F. & Lindauer, R. J. L., 2016, In : Children and youth services review. 64, p. 42-50Research output: Contribution to journal › Article › Academic › peer-review
14 Citations (Scopus) -
Social engineering: digitale fraude en misleiding: een meta-analyse van studies naar de effectiviteit van interventies
Bullee, J-W. H. & Junger, M., Jul 2020, In : Justitiële verkenningen. 46, 2, p. 92-110Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile136 Downloads (Pure) -
Spear phishing in organisations explained
Bullee, J-W., Montoya, L., Junger, M. & Hartel, P., Jul 2017, In : Information and Computer Security. 25, 5, p. 593-613 21 p.Research output: Contribution to journal › Article › Academic › peer-review
14 Citations (Scopus)1 Downloads (Pure) -
Targets for Primary Prevention: Cultural, Social and Intrapersonal Factors Associated with Co-occurring Health-related Behaviours
Dusseldorp, E., Klein Velderman, M., Paulussen, T. G. W. M., Junger, M., van Nieuwenhuijzen, M. & Reijneveld, S. A., 13 Jan 2014, In : Psychology & health. 29, 5, p. 598-611Research output: Contribution to journal › Article › Academic › peer-review
11 Citations (Scopus) -
Teaching Empirical Social-Science Research to Cybersecurity Students: The Case of "Thinking Like a Thief"
Barth, S., Hartel, P. H., Junger, M. & Montoya, L., 14 May 2019, In : IEEE security & privacy. 17, 3, p. 8-16 9 p.Research output: Contribution to journal › Article › Academic › peer-review
-
The effectiveness of parent-child interaction therapy in the Netherlands: Preliminary results of a randomized controlled trial.
Abrahamse, M., Junger, M. & Lindauer, R. J., 2012, In : Neuropsychiatrie de l'enfance et de l'adolesence. 60, 5, p. S88-S88 1 p.Research output: Contribution to journal › Article › Academic › peer-review
-
The persuasion and security awareness experiment: reducing the success of social engineering attacks
Bullee, J-W., Montoya, L., Pieters, W., Junger, M. & Hartel, P. H., Mar 2015, In : Journal of experimental criminology. 11, 1, p. 97-115 19 p.Research output: Contribution to journal › Article › Academic › peer-review
31 Citations (Scopus)