Find Research Outputs

Search in all content

Filters for Research Output

Search concepts
Selected filters

Publication Year

  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2011

Author

  • Marianne Junger
2020

A Note on Analysing the Attacker Aims Behind DDoS Attacks

Abhishta, A., Junger, M., Joosten, R. & Nieuwenhuis, L. J. M., 1 Jan 2020, Intelligent Distributed Computing XIII, IDC 2019. Kotenko, I., Badica, C., Desnitsky, V., El Baz, D. & Ivanovic, M. (eds.). Springer, p. 255-265 11 p. Chapter 30. (Studies in Computational Intelligence; vol. 868).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
1 Citation (Scopus)
116 Downloads (Pure)

Digital signatures: a tool to prevent and predict dishonesty?

Koning, L., Junger, M. & van Hoof, J., 7 Jul 2020, In : Mind and Society.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
7 Downloads (Pure)
Open Access
File
72 Downloads (Pure)
2019

Cyber-offenders versus traditional offenders: an empirical comparison

Junger, M., 2019, In : Tijdschrift voor criminologie. 61, 1, 6 p.

Research output: Contribution to journalBook/Film/Article reviewAcademic

Open Access
File
34 Downloads (Pure)

Cybersafety Threats - from Deception to Aggression

Benenson, Z., Junger, M., Oliveira, D. & Stringhini, G., Jul 2019.

Research output: Contribution to conferencePaper

Open Access
File
53 Downloads (Pure)

De boer aan het woord: diepte-interviews over het agrarisch ondernemerschap anno 2019

Junger, M., van Hoof, J. J., Koning, L. & Nab, M., 2019, University of Twente.

Research output: Book/ReportReportProfessional

Laptop Theft in a University Setting can be Avoided with Warnings

Nadeem, A. & Junger, M., 18 Jul 2019, ArXiv.

Research output: Working paper

Open Access
File
7 Downloads (Pure)
64 Downloads (Pure)

Psychometric Properties of the Dyadic Parent-Child Interaction Coding System in The Netherlands

Abrahamse, M. E., Niec, L. N., Solomon, D. T., Junger, M. & Lindauer, R. J. L., 16 Jul 2019, In : Child and Family Behavior Therapy. 41, 3, p. 141-158 18 p.

Research output: Contribution to journalArticleAcademicpeer-review

1 Citation (Scopus)
Open Access
File
7 Citations (Scopus)
93 Downloads (Pure)

Teaching Empirical Social-Science Research to Cybersecurity Students: The Case of "Thinking Like a Thief"

Barth, S., Hartel, P. H., Junger, M. & Montoya, L., 14 May 2019, In : IEEE security & privacy. 17, 3, p. 8-16 9 p.

Research output: Contribution to journalArticleAcademicpeer-review

1 Downloads (Pure)

Victim routine influences the number of DDoS attacks: Evidence from Dutch educational network

Abhishta, A., Junger, M., Joosten, R. & Nieuwenhuis, L. J. M., 19 Sep 2019, 2019 IEEE Security and Privacy Workshops, SPW 2019. IEEE, p. 242-247 6 p. 8844620

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)
5 Downloads (Pure)
2018

Computer Science

Hartel, P. H. & Junger, M., 30 Dec 2018, Routledge Handbook of Crime Science: Every new technology brings new opportunity for crime, and information and communication technology (ICT) is no exception. This short article offers students of crime insights in the two main connections between ICT and criminology. On the one hand we show how ICT can be used as a tool, target, or location of crime. On the other hand we show how ICT can be used as a tool to study crime.. Wortley, R., Sidebottom, A., Tilley, N. & Laycock, G. (eds.). 1 ed. London: Routledge, p. 179-189 11 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

47 Downloads (Pure)

Correlates of Mono- and Dual-Victims of Cybergrooming and Cyberbullying: Evidence from Four Countries

Wachs, S., Whittle, H. C., Hamilton-Giachritsis, C., Wolf, K. D., Vazsonyi, A. T. & Junger, M., 1 Feb 2018, In : Cyberpsychology, behavior and social networking. 21, 2, p. 91-98 8 p.

Research output: Contribution to journalArticleAcademicpeer-review

6 Citations (Scopus)

Het succes van social engineering

Bullee, J-W., Montoya, L., Junger, M. & Hartel, P., 2018, In : Tijdschrift voor veiligheid. 17, 1-2, p. 40-53 14 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
215 Downloads (Pure)

On the anatomy of social engineering attacks: A literature-based dissection of successful attacks

Bullée, J-W. H., Montoya, L., Pieters, W., Junger, M. & Hartel, P., Jan 2018, In : Journal of Investigative Psychology and Offender Profiling. 15, 1, p. 20-45 26 p.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
5 Citations (Scopus)
94 Downloads (Pure)

Parental Self-Control and the Development of Male Aggression in Early Childhood: A Longitudinal Test of Self-Control Theory

Meldrum, R. C., Verhoeven, M., Junger, M., van Aken, M. A. G. & Dekovic, M., 1 Mar 2018, In : International journal of offender therapy and comparative criminology. 62, 4, p. 935-957 23 p.

Research output: Contribution to journalArticleAcademicpeer-review

12 Citations (Scopus)

The influence of the presentation of camera surveillance on cheating and pro-social behavior

Jansen, A. M., Giebels, E., van Rompay, T. J. L. & Junger, M., 16 Oct 2018, In : Frontiers in psychology. 9, OCT, 1937.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
1 Citation (Scopus)
45 Downloads (Pure)

Victims of cybercrime in Europe: a review of victim surveys

Reep-van den Bergh, C. M. M. & Junger, M., 1 Dec 2018, In : Crime science. 7, 1, 15 p., 5.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
8 Citations (Scopus)
102 Downloads (Pure)

How Effective is Anti-Phishing Training for Children? (Distinguished Paper Award)

Lastdrager, E. E. H., Carvajal Gallardo, I. R., Hartel, P. H. & Junger, M., 14 Jul 2017, Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association, p. 229-239 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
25 Downloads (Pure)

Order and control in the environment: Exploring the effects on undesired behaviour and the importance of locus of control

Jansen, A. M., Giebels, E., van Rompay, T. J. L., Austrup, S. & Junger, M., Sep 2017, In : Legal and criminological psychology. 22, 2, p. 213-227

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
356 Downloads (Pure)

Priming and warnings are not effective to prevent social engineering attacks

Junger, M., Montoya, L. & Overink, F. J., 2017, In : Computers in human behavior. 66, p. 75-87 13 p.

Research output: Contribution to journalArticleAcademicpeer-review

41 Citations (Scopus)
1 Downloads (Pure)

Spear phishing in organisations explained

Bullee, J-W., Montoya, L., Junger, M. & Hartel, P., Jul 2017, In : Information and Computer Security. 25, 5, p. 593-613 21 p.

Research output: Contribution to journalArticleAcademicpeer-review

13 Citations (Scopus)
1 Downloads (Pure)

The role of self-control and cognitive functioning in educational inequalities in adolescent smoking and binge drinking

Davies, L. E. M., Kuipers, M. A. G., Junger, M. & Kunst, A. E., 16 Sep 2017, In : BMC public health. 17, 9 p., 714.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
3 Citations (Scopus)
63 Downloads (Pure)

Towards the normalization of cybercrime victimization: A routine activities analysis of cybercrime in europe

Junger, M., Montoya, L., Hartel, P. H. & Heydari, M., 19 Oct 2017, 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA). IEEE

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)
2016

A cross-national study of direct and indirect effects of cyberbullying on cybergrooming victimization via self-esteem

Wachs, S., Jiskrova, G. K., Vazsonyi, A. T., Wolf, K. D. & Junger, M., 2 Mar 2016, In : Psicologia educativa. 22, 1, p. 61-70

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
21 Citations (Scopus)
90 Downloads (Pure)

Book review: Crime and Everyday Life by Marcus Felson and Mary Eckert, 5th edition

Hartel, P. H. & Junger, M., 9 Aug 2016, In : Crime science. 5, 10, p. 10:1-10:3 3 p.

Research output: Contribution to journalBook/Film/Article reviewAcademic

Open Access
File
41 Downloads (Pure)

Risk factors for attrition from an evidence-based parenting program: Findings from the Netherlands

Abrahamse, M., Niec, L. N., Junger, M., Boer, F. & Lindauer, R. J. L., 2016, In : Children and youth services review. 64, p. 42-50

Research output: Contribution to journalArticleAcademicpeer-review

13 Citations (Scopus)

Slachtofferschap bij cybercrime: pilotonderzoek

Junger, M., Wiegersma, S., de Vries, T. & Veldkamp, B. P., 2016, Enschede: Universiteit Twente.

Research output: Book/ReportReportProfessional

Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention

Bullee, J-W., Montoya, L., Junger, M. & Hartel, P. H., Jan 2016, Proceedings of the inaugural Singapore Cyber Security R&D Conference (SG-CRC 2016). Mathur, A. & Roychoudhury, A. (eds.). Amsterdam: IOS Press, p. 107-114 6 p. (Cryptology and Information Security Series; vol. 14).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
9 Citations (Scopus)
260 Downloads (Pure)

The Relation Between Residential Property and its Surroundings and Day- and Night-Time Residential Burglary

Montoya, L., Junger, M. & Ongena, Y., Apr 2016, In : Environment and behavior. 48, 4, p. 515-549 35 p.

Research output: Contribution to journalArticleAcademicpeer-review

22 Citations (Scopus)
2015

Apate: Anti-Phishing Analysing and Triaging Environment (Poster)

Lastdrager, E. E. H., Hartel, P. H. & Junger, M., 18 May 2015, 36th IEEE Symposium on Security and Privacy. Piscataway, New Jersey: IEEE Computer Society, p. - 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
110 Downloads (Pure)

Cultural, social and intrapersonal factors associated with clusters of co-occurring health-related behaviours among adolescents

Klein Velderman, M., Dusseldorp, E., van Nieuwenhuijzen, M., Junger, M., Paulussen, T. G. W. M. & Reijneveld, S. A., 14 May 2015, In : European journal of public health. 25, 1, p. 31-37

Research output: Contribution to journalArticleAcademicpeer-review

File
9 Citations (Scopus)
59 Downloads (Pure)

Parental Mental Health and Self-Control as Predictors of Effortful Control in Young Boys: Mediating Effects of Parenting Behaviors

Karreman, A., van Aken, M., Dekovic, M., Verhoeven, M., Junger, M., van de Beek, C., van Aken, C. & Doreleijers, T. A. H., 19 Mar 2015.

Research output: Contribution to conferencePaper

Psychometric Properties of the Dutch Eyberg Child Behavior Inventory (ECBI) in a Community Sample and a Multi-Ethnic Clinical Sample

Abrahamse, M., Junger, M., Leijten, P. H. O., Boer, F. & Lindauer, R. J. L., 25 Mar 2015, In : Journal of psychopathology and behavioral assessment. 37, 4, p. 679-691

Research output: Contribution to journalArticleAcademicpeer-review

File
18 Citations (Scopus)
60 Downloads (Pure)

Regression Nodes: Extending attack trees with data from social sciences

Bullee, J-W., Montoya, L., Pieters, W., Junger, M. & Hartel, P. H., Jul 2015, Proceedings of the Workshop on Socio-Technical Aspects in Security and Trust (STAST 2015). Piscataway, New Jersey: IEEE Computer Society, p. 17-23 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

Technology-supported Risk Estimation by Predictive Assessment of Socio-technical Security

Coles-Kemp, L., Bullée, J-W., Montoya, L., Junger, M., Heath, C. P., Pieters, W. & Wolos, L., 2015, Trespass Project. 96 p.

Research output: Book/ReportReportProfessional

Open Access
File
13 Downloads (Pure)

The persuasion and security awareness experiment: reducing the success of social engineering attacks

Bullee, J-W., Montoya, L., Pieters, W., Junger, M. & Hartel, P. H., Mar 2015, In : Journal of experimental criminology. 11, 1, p. 97-115 19 p.

Research output: Contribution to journalArticleAcademicpeer-review

31 Citations (Scopus)

Traditional, Cyber and Combined Bullying Roles: Differences in Risky Online and Offline Activities

Wachs, S., Junger, M. & Sittichai, R., 2015, In : Societies. 5, 1, p. 109-135

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
127 Downloads (Pure)

Treating Child Disruptive Behavior in High-Risk Families: A Comparative Effectiveness Trial from a Community-Based Implementation

Abrahamse, M., Junger, M., van Wouwe, M. A. M. M., Boer, F. & Lindauer, R. J. L., 26 Nov 2015, In : Journal of child and family studies. 25, 5, p. 1605-1622

Research output: Contribution to journalArticleAcademicpeer-review

File
23 Citations (Scopus)
42 Downloads (Pure)
2014

Jeugdcriminaliteit: het belang van vroegtijdig ingrijpen

Junger, M., 2014, In : Spanning. 16, 9, p. 18-19

Research output: Contribution to journalArticleProfessional

File
188 Downloads (Pure)

Prenatal and postnatal preventive interventions based on risk factors

Feder, L. & Junger, M., 2014, Encyclopedia of Criminology and Criminal Justice. Bruinsma, G. & Weisburd, D. (eds.). Springer, p. 3895-3905

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Repeat victimization in cyber space

Junger, M., Wachs, S., Broekman, C. & Lastdrager, E. E. H., 6 Nov 2014, p. -.

Research output: Contribution to conferencePaper

RISK-DET: ICT Security Awareness Aspect Combining Education and Cognitive Sciences

Schaff, G., Harpes, C., Aubigny, M., Junger, M. & Martin, R., 23 Jun 2014, Ninth International Multi-Conference on Computing in the Global Information Technology, ICCGI 2014. Leist, A. & Pankowski, T. (eds.). Wilmington, Delaware: IARIA, 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Targets for Primary Prevention: Cultural, Social and Intrapersonal Factors Associated with Co-occurring Health-related Behaviours

Dusseldorp, E., Klein Velderman, M., Paulussen, T. G. W. M., Junger, M., van Nieuwenhuijzen, M. & Reijneveld, S. A., 13 Jan 2014, In : Psychology & health. 29, 5, p. 598-611

Research output: Contribution to journalArticleAcademicpeer-review

11 Citations (Scopus)
2011

Actuele Criminologie

Dijk, J. J. M. V., Junger, M. & Sagel-grande, I., 2011, Den Haag: SDU. 384 p.

Research output: Book/ReportBook editingPopular

Der Einfluss von Bebauung und Nachbarschaft auf das Einbruchrisiko

Lorei, C. (ed.), Montoya, L., Ongena, Y. & Junger, M., 2011, In : Polizei und Wissenschaft. 2011, 3, p. 43-57 17 p.

Research output: Contribution to journalArticleAcademic

What is convergence in time and space for cyber crime?

Hartel, P. & Junger, M., 28 Mar 2011, p. -.

Research output: Contribution to conferencePaper