1. 2019
  2. Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources

    Barth, S., de Jong, M. D. T., Junger, M., Hartel, P. & Roppelt, J. C., 2019, (Accepted/In press) In : Telematics and Informatics. p. 1-15 15 p.

    Research output: Contribution to journalArticleScientificpeer-review

  3. Teaching Empirical Social-Science Research to Cybersecurity Students: The Case of "Thinking Like a Thief"

    Barth, S., Hartel, P., Junger, M. & Montoya, L., 2019, In : IEEE Security & Privacy Magazine: building confidence in a networked world. 17, 3, p. 8-16 9 p.

    Research output: Contribution to journalArticleScientificpeer-review

  4. 2018
  5. Computer science

    Hartel, P. & Junger, M., 2018, Routledge Handbook of Crime Science. Wortley, R., Sidebottom, A., Tilley, N. & Laycock, G. (eds.). 1st ed. Routledge, p. 179-189 11 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterScientific

  6. Het succes van social engineering

    Bullée, J. W., Montoya, L., Junger, M. & Hartel, P., 2018, In : Tijdschrift voor Veiligheid. 17, 1-2, p. 40-53 14 p.

    Research output: Contribution to journalArticleProfessional

  7. On the anatomy of social engineering attacks: A literature-based dissection of successful attacks

    Bullée, J. W. H., Montoya, L., Pieters, W., Junger, M. & Hartel, P., 2018, In : Journal of Investigative Psychology and Offender Profiling. p. 20-45 26 p.

    Research output: Contribution to journalArticleScientificpeer-review

  8. Physical Location of Smart Key Activators: A Building Security Penetration Test

    Bullée, J. W., Montoya Morales, L., Junger, M. & Hartel, P., 2018, In : Journal of Corporate Real Estate. 20, 2, p. 138-151 14 p.

    Research output: Contribution to journalArticleScientificpeer-review

  9. 2017
  10. DECANTeR: DEteCtion of Anomalous outbouNd HTTP Traffic by Passive Application Fingerprinting

    Bortolameotti, R., van Ede, T., Caselli, M., Everts, M., Hartel, P., Hofstede, R., Jonker, W. & Peter, A., 2017, Proceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017. New York, NY: Association for Computing Machinery (ACM), Vol. Part F132521. p. 373-386 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  11. How Effective is Anti-Phishing Training for Children?

    Lastdrager, E., Carvajal Gallardo, I., Hartel, P. & Junger, M., 2017, Proceedings of the thirteenth Symposium on Usable Privacy and Security, SOUPS 2017. Berkely, CA: USENIX Association, p. 229-239 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  12. Spear Phishing in Organisations Explained

    Bullee, J. W., Montoya, L., Junger, M. & Hartel, P., 2017, In : Information and Computer Security. 25, 5, p. 593-613 21 p.

    Research output: Contribution to journalArticleScientificpeer-review

  13. Towards the normalization of cybercrime victimization: A routine activities analysis of cybercrime in Europe

    Junger, M., Montoya, L., Hartel, P. & Heydari, M., 2017, International Conference on Cyber Situational Awareness, Data Analytics and Assessment, Cyber SA 2017. Piscataway, NJ: IEEE, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Previous 1 2 Next

ID: 194943