Search concepts
|
Selected filters |
- 1 - 50 out of 57 results
- Export search results
Search results
-
Working paper
Characteristics of DDoS attacks: An analysis of the most reported attack events of 2016
Abhishta, A., Nieuwenhuis, L. J. M., Junger, M. & Joosten, R. A. M. G., 2017.Research output: Working paper
-
Laptop Theft in a University Setting can be Avoided with Warnings
Nadeem, A. & Junger, M., 18 Jul 2019, ArXiv.Research output: Working paper
Open AccessFile9 Downloads (Pure) -
Review article
How effective are social engineering interventions? A meta-analysis
Bullee, J. W. & Junger, M., 5 Aug 2020, In : Information and Computer Security. 28, 5, p. 801-830 30 p.Research output: Contribution to journal › Review article › Academic › peer-review
-
Report
De boer aan het woord: diepte-interviews over het agrarisch ondernemerschap anno 2019
Junger, M., van Hoof, J. J., Koning, L. & Nab, M., 2019, University of Twente.Research output: Book/Report › Report › Professional
-
Project 'Nudging and improved form design': Evaluatie van formulier aanvullende gegevens: De functie voor en het gebruik door agrarisch ondernemers
Junger, M., van Hoof, J. J., Koning, L. & Nab, M., 27 May 2019Research output: Book/Report › Report › Professional
Open AccessFile92 Downloads (Pure) -
Slachtofferschap bij cybercrime: pilotonderzoek
Junger, M., Wiegersma, S., de Vries, T. & Veldkamp, B. P., 2016, Enschede: Universiteit Twente.Research output: Book/Report › Report › Professional
-
Teaching Engineering students to "Think thief"
Hartel, P. H. & Junger, M., Jul 2012, Enschede: Centre for Telematics and Information Technology (CTIT). 12 p. (CTIT Technical Report Series; no. TR-CTIT-12-19)Research output: Book/Report › Report › Professional
File164 Downloads (Pure) -
Teaching Information Security Students to "Think thief"
Hartel, P. H. & Junger, M., 2012, Enschede, The Netherlands: Universiteit Twente. 7 p. (CTIT technical report; no. 12-19)Research output: Book/Report › Report › Professional
File35 Downloads (Pure) -
Technology-supported Risk Estimation by Predictive Assessment of Socio-technical Security
Coles-Kemp, L., Bullée, J-W., Montoya, L., Junger, M., Heath, C. P., Pieters, W. & Wolos, L., 2015, Trespass Project. 96 p.Research output: Book/Report › Report › Professional
Open AccessFile16 Downloads (Pure) -
Paper
Cybersafety Threats - from Deception to Aggression
Benenson, Z., Junger, M., Oliveira, D. & Stringhini, G., Jul 2019.Research output: Contribution to conference › Paper › Academic › peer-review
Open AccessFile102 Downloads (Pure) -
Parental Mental Health and Self-Control as Predictors of Effortful Control in Young Boys: Mediating Effects of Parenting Behaviors
Karreman, A., van Aken, M., Dekovic, M., Verhoeven, M., Junger, M., van de Beek, C., van Aken, C. & Doreleijers, T. A. H., 19 Mar 2015.Research output: Contribution to conference › Paper › Academic
-
What is convergence in time and space for cyber crime?
Hartel, P. & Junger, M., 28 Mar 2011, p. -.Research output: Contribution to conference › Paper › Academic
-
Conference contribution
A Note on Analysing the Attacker Aims Behind DDoS Attacks
Abhishta, A., Junger, M., Joosten, R. & Nieuwenhuis, L. J. M., 1 Jan 2020, Intelligent Distributed Computing XIII, IDC 2019. Kotenko, I., Badica, C., Desnitsky, V., El Baz, D. & Ivanovic, M. (eds.). Springer, p. 255-265 11 p. Chapter 30. (Studies in Computational Intelligence; vol. 868).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
Open AccessFile1 Citation (Scopus)148 Downloads (Pure) -
Apate: Anti-Phishing Analysing and Triaging Environment (Poster)
Lastdrager, E. E. H., Hartel, P. H. & Junger, M., 18 May 2015, 36th IEEE Symposium on Security and Privacy. Piscataway, New Jersey: IEEE Computer Society, p. - 2 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
File113 Downloads (Pure) -
How Effective is Anti-Phishing Training for Children? (Distinguished Paper Award)
Lastdrager, E. E. H., Carvajal Gallardo, I. R., Hartel, P. H. & Junger, M., 14 Jul 2017, Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association, p. 229-239 11 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
Open AccessFile29 Downloads (Pure) -
Regression Nodes: Extending attack trees with data from social sciences
Bullee, J-W., Montoya, L., Pieters, W., Junger, M. & Hartel, P. H., Jul 2015, Proceedings of the Workshop on Socio-Technical Aspects in Security and Trust (STAST 2015). Piscataway, New Jersey: IEEE Computer Society, p. 17-23 7 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
2 Citations (Scopus) -
Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention
Bullee, J-W., Montoya, L., Junger, M. & Hartel, P. H., Jan 2016, Proceedings of the inaugural Singapore Cyber Security R&D Conference (SG-CRC 2016). Mathur, A. & Roychoudhury, A. (eds.). Amsterdam: IOS Press, p. 107-114 6 p. (Cryptology and Information Security Series; vol. 14).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
File9 Citations (Scopus)311 Downloads (Pure) -
Towards the normalization of cybercrime victimization: A routine activities analysis of cybercrime in europe
Junger, M., Montoya, L., Hartel, P. H. & Heydari, M., 19 Oct 2017, 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA). IEEEResearch output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
4 Citations (Scopus) -
Victim routine influences the number of DDoS attacks: Evidence from Dutch educational network
Abhishta, A., Junger, M., Joosten, R. & Nieuwenhuis, L. J. M., 19 Sep 2019, 2019 IEEE Security and Privacy Workshops, SPW 2019. IEEE, p. 242-247 6 p. 8844620Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
1 Citation (Scopus)5 Downloads (Pure) -
Chapter
Computer Science
Hartel, P. H. & Junger, M., 30 Dec 2018, Routledge Handbook of Crime Science: Every new technology brings new opportunity for crime, and information and communication technology (ICT) is no exception. This short article offers students of crime insights in the two main connections between ICT and criminology. On the one hand we show how ICT can be used as a tool, target, or location of crime. On the other hand we show how ICT can be used as a tool to study crime.. Wortley, R., Sidebottom, A., Tilley, N. & Laycock, G. (eds.). 1 ed. London: Routledge, p. 179-189 11 p.Research output: Chapter in Book/Report/Conference proceeding › Chapter › Academic › peer-review
-
New Directions in the study of the relations between parenting and externalizing behaviors in toddlerhood
van Aken, C., Junger, M., Verhoeven, M., van Aken, M. A. G. & Dekovic, M., 2012, Child development and child poverty. Fiedler, A. & Kuester, I. (eds.). New York, NJ, USA: Nova Science, p. 155-176 (Children's Issues, Laws and Programs).Research output: Chapter in Book/Report/Conference proceeding › Chapter › Academic › peer-review
-
New opportunities in the digital age: mobile phone ownership, usage and truancy by high school students
Junger, M., Ottenhof, R. H. J. & Hartel, P. H., Dec 2012, KLM Van Dijk : Liber Amicorum prof.dr.mr. J.J.M. van Dijk. Groenhuijsen, M., Letschert, R. & Hazenbroek, S. (eds.). Nijmegen: Wolf Legal Publishers, p. 191-206 16 p.Research output: Chapter in Book/Report/Conference proceeding › Chapter › Academic
File36 Downloads (Pure) -
New opportunities in the digital age: mobile phone ownership, usage and truancy by high school students
Junger, M., Ottenhof, R. H. J. & Hartel, P. H., 2012, KLM Van Dijk: Liber Amicorum prof.dr.mr. J.J.M. van Dijk. Groenhuijsen, M., Letschert, R. & Hazenbroek, S. (eds.). Nijmegen: Wolf Legal Publishers, p. 191-206Research output: Chapter in Book/Report/Conference proceeding › Chapter › Academic
File17 Downloads (Pure) -
Social engineering
Bullée, J. W. & Junger, M., 6 Jun 2020, The Palgrave Handbook of International Cybercrime and Cyberdeviance. Holt, T. J. & Bossler, A. M. (eds.). Palgrave Macmillan Ltd., p. 849-875 27 p.Research output: Chapter in Book/Report/Conference proceeding › Chapter › Academic › peer-review
-
Book editing
Actuele Criminologie
Dijk, J. J. M. V., Junger, M. & Sagel-grande, I., 2011, Den Haag: SDU. 384 p.Research output: Book/Report › Book editing › Popular
-
Book/Film/Article review
Book review: Crime and Everyday Life by Marcus Felson and Mary Eckert, 5th edition
Hartel, P. H. & Junger, M., 9 Aug 2016, In : Crime science. 5, 10, p. 10:1-10:3 3 p.Research output: Contribution to journal › Book/Film/Article review › Academic
Open AccessFile -
Cyber-offenders versus traditional offenders: an empirical comparison
Junger, M., 2019, In : Tijdschrift voor criminologie. 61, 1, 6 p.Research output: Contribution to journal › Book/Film/Article review › Academic
Open AccessFile -
Article
A cross-national study of direct and indirect effects of cyberbullying on cybergrooming victimization via self-esteem
Wachs, S., Jiskrova, G. K., Vazsonyi, A. T., Wolf, K. D. & Junger, M., 2 Mar 2016, In : Psicologia educativa. 22, 1, p. 61-70Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile21 Citations (Scopus)99 Downloads (Pure) -
Clustering of health and risk behaviour in immigrant and indigenous Dutch residents aged 19-40 years.
Reijneveld, S. A., van Nieuwenhuijzen, M., Klein Velderman, M., Paulussen, T. G. W. M. & Junger, M., 2012, In : International journal of public health. 57, 2, p. 351-361 11 p.Research output: Contribution to journal › Article › Academic › peer-review
File10 Citations (Scopus)72 Downloads (Pure) -
Correlates of Mono- and Dual-Victims of Cybergrooming and Cyberbullying: Evidence from Four Countries
Wachs, S., Whittle, H. C., Hamilton-Giachritsis, C., Wolf, K. D., Vazsonyi, A. T. & Junger, M., 1 Feb 2018, In : Cyberpsychology, behavior and social networking. 21, 2, p. 91-98 8 p.Research output: Contribution to journal › Article › Academic › peer-review
7 Citations (Scopus) -
Crime science: editorial statement
Junger, M., Laycock, G., Hartel, P. H. & Ratcliffe, J., 11 Jun 2012, In : Crime science. 1, 1, 3 p., 1.Research output: Contribution to journal › Article › Academic
Open AccessFile -
Cultural, social and intrapersonal factors associated with clusters of co-occurring health-related behaviours among adolescents
Klein Velderman, M., Dusseldorp, E., van Nieuwenhuijzen, M., Junger, M., Paulussen, T. G. W. M. & Reijneveld, S. A., 14 May 2015, In : European journal of public health. 25, 1, p. 31-37Research output: Contribution to journal › Article › Academic › peer-review
File9 Citations (Scopus)65 Downloads (Pure) -
Der Einfluss von Bebauung und Nachbarschaft auf das Einbruchrisiko
Lorei, C. (ed.), Montoya, L., Ongena, Y. & Junger, M., 2011, In : Polizei und Wissenschaft. 2011, 3, p. 43-57 17 p.Research output: Contribution to journal › Article › Academic
-
Digital signatures: a tool to prevent and predict dishonesty?
Koning, L., Junger, M. & van Hoof, J., Nov 2020, In : Mind and Society. 19, 2, p. 257-285 29 p.Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile -
Fraud against businesses both online and offline: Crime scripts, business characteristics, efforts, and benefits
Junger, M., Wang, V. & Schlömer, M., 9 Jul 2020, In : Crime science. 9, 1, 13.Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile -
Het succes van social engineering
Bullee, J-W., Montoya, L., Junger, M. & Hartel, P., 2018, In : Tijdschrift voor veiligheid. 17, 1-2, p. 40-53 14 p.Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile -
On the anatomy of social engineering attacks: A literature-based dissection of successful attacks
Bullée, J-W. H., Montoya, L., Pieters, W., Junger, M. & Hartel, P., Jan 2018, In : Journal of Investigative Psychology and Offender Profiling. 15, 1, p. 20-45 26 p.Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile7 Citations (Scopus)103 Downloads (Pure) -
Order and control in the environment: Exploring the effects on undesired behaviour and the importance of locus of control
Jansen, A. M., Giebels, E., van Rompay, T. J. L., Austrup, S. & Junger, M., Sep 2017, In : Legal and criminological psychology. 22, 2, p. 213-227Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile -
Parental Self-Control and the Development of Male Aggression in Early Childhood: A Longitudinal Test of Self-Control Theory
Meldrum, R. C., Verhoeven, M., Junger, M., van Aken, M. A. G. & Dekovic, M., 1 Mar 2018, In : International journal of offender therapy and comparative criminology. 62, 4, p. 935-957 23 p.Research output: Contribution to journal › Article › Academic › peer-review
12 Citations (Scopus) -
Parent-child interaction therapy for preschool children with disruptive behaviour problems in the Netherlands
Abrahamse, M. E., Junger, M., Chavannes, E. L., Coelman, F. J. G., Boer, F. & Lindauer, R. J. L., 2012, In : Child and adolescent psychiatry and mental health. 6, 24, 9 p., 24.Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile29 Citations (Scopus)75 Downloads (Pure) -
Priming and warnings are not effective to prevent social engineering attacks
Junger, M., Montoya, L. & Overink, F. J., 2017, In : Computers in human behavior. 66, p. 75-87 13 p.Research output: Contribution to journal › Article › Academic › peer-review
45 Citations (Scopus)1 Downloads (Pure) -
Psychometric Properties of the Dutch Eyberg Child Behavior Inventory (ECBI) in a Community Sample and a Multi-Ethnic Clinical Sample
Abrahamse, M., Junger, M., Leijten, P. H. O., Boer, F. & Lindauer, R. J. L., 25 Mar 2015, In : Journal of psychopathology and behavioral assessment. 37, 4, p. 679-691Research output: Contribution to journal › Article › Academic › peer-review
File19 Citations (Scopus)65 Downloads (Pure) -
Psychometric Properties of the Dyadic Parent-Child Interaction Coding System in The Netherlands
Abrahamse, M. E., Niec, L. N., Solomon, D. T., Junger, M. & Lindauer, R. J. L., 16 Jul 2019, In : Child and Family Behavior Therapy. 41, 3, p. 141-158 18 p.Research output: Contribution to journal › Article › Academic › peer-review
1 Citation (Scopus) -
Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources
Barth, S., de Jong, M. D. T., Junger, M., Hartel, P. H. & Roppelt, J. C., 1 Aug 2019, In : Telematics and informatics. 41, p. 55-69 15 p.Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile14 Citations (Scopus)118 Downloads (Pure) -
Risk factors for attrition from an evidence-based parenting program: Findings from the Netherlands
Abrahamse, M., Niec, L. N., Junger, M., Boer, F. & Lindauer, R. J. L., 2016, In : Children and youth services review. 64, p. 42-50Research output: Contribution to journal › Article › Academic › peer-review
14 Citations (Scopus) -
Social engineering: digitale fraude en misleiding: een meta-analyse van studies naar de effectiviteit van interventies
Bullee, J-W. H. & Junger, M., Jul 2020, In : Justitiële verkenningen. 46, 2, p. 92-110Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile136 Downloads (Pure) -
Spear phishing in organisations explained
Bullee, J-W., Montoya, L., Junger, M. & Hartel, P., Jul 2017, In : Information and Computer Security. 25, 5, p. 593-613 21 p.Research output: Contribution to journal › Article › Academic › peer-review
14 Citations (Scopus)1 Downloads (Pure) -
Teaching Empirical Social-Science Research to Cybersecurity Students: The Case of "Thinking Like a Thief"
Barth, S., Hartel, P. H., Junger, M. & Montoya, L., 14 May 2019, In : IEEE security & privacy. 17, 3, p. 8-16 9 p.Research output: Contribution to journal › Article › Academic › peer-review
-
The effectiveness of parent-child interaction therapy in the Netherlands: Preliminary results of a randomized controlled trial.
Abrahamse, M., Junger, M. & Lindauer, R. J., 2012, In : Neuropsychiatrie de l'enfance et de l'adolesence. 60, 5, p. S88-S88 1 p.Research output: Contribution to journal › Article › Academic › peer-review
-
The influence of the presentation of camera surveillance on cheating and pro-social behavior
Jansen, A. M., Giebels, E., van Rompay, T. J. L. & Junger, M., 16 Oct 2018, In : Frontiers in psychology. 9, OCT, 1937.Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile1 Citation (Scopus)53 Downloads (Pure)