Folgen
Jan-Willem H. Bullee
Jan-Willem H. Bullee
PhD
Bestätigte E-Mail-Adresse bei utwente.nl
Titel
Zitiert von
Zitiert von
Jahr
The persuasion and security awareness experiment: reducing the success of social engineering attacks
JWH Bullée, L Montoya, W Pieters, M Junger, PH Hartel
Journal of experimental criminology 11, 97-115, 2015
1502015
On the anatomy of social engineering attacks—A literature‐based dissection of successful attacks
JWH Bullée, L Montoya, W Pieters, M Junger, P Hartel
Journal of investigative psychology and offender profiling 15 (1), 20-45, 2018
852018
Spear phishing in organisations explained
JW Bullee, L Montoya, M Junger, P Hartel
Information & Computer Security 25 (5), 593-613, 2017
822017
How effective are social engineering interventions? A meta-analysis
JW Bullee, M Junger
Information & Computer Security 28 (5), 801-830, 2020
392020
Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention
JW Bullée, L Montoya, M Junger, PH Hartel
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 107-114, 2016
382016
Tangible modelling to elicit domain knowledge: an experiment and focus group
D Ionita, R Wieringa, JW Bullee, A Vasenev
Conceptual Modeling: 34th International Conference, ER 2015, Stockholm …, 2015
182015
Argumentation-based security requirements elicitation: The next round
D Ionita, JW Bullee, RJ Wieringa
2014 IEEE 1st International Workshop on Evolving Security and Privacy …, 2014
172014
Social engineering
JW Bullée, M Junger
The Palgrave Handbook of International Cybercrime and Cyberdeviance, 849-875, 2020
162020
Experimental social engineering: Investigation and prevention
JW Bullee
142017
Investigating the usability and utility of tangible modelling of socio-technical architectures
D Ionita, R Wieringa, JW Bullee, A Vasenev
University of Twente, Enschede, Netherlands, 2015
52015
Regression Nodes: Extending attack trees with data from social sciences
JWH Bullée, L Montoya, W Pieters, M Junger, PH Hartel
2015 Workshop on Socio-Technical Aspects in Security and Trust, 17-23, 2015
42015
Technology-supported risk estimation by predictive assessment of socio-technical security
L Coles-Kemp, JW Bullée, L Montoya, M Junger, CP Heath, W Pieters, ...
Trespass Project, 2015
42015
First Steps to Improve Cybersecurity Behaviour–a Virtual Reality Experience
L Klooster, R Van Delden, JW Bullée
Proceedings of the 17th European Conference on Game-Based Learning: ECGBL, 2023
32023
Social engineering: digitale fraude en misleiding
JW Bullée, M Junger
Justitiele Verkenningen 46 (2), 2020
32020
Physical location of smart key activators–a building security penetration test
JW Bullee, L Montoya, M Junger, P Hartel
Journal of Corporate Real Estate 20 (2), 138-151, 2018
32018
Detection of leadership in informal (small) groups based on CCTV information
JW Bullée
University of Twente, 2013
22013
Social engineering: digitale fraude en misleiding: een meta-analyse van studies naar de effectiviteit van interventies
JWH Bullee, M Junger
Justitiële verkenningen 46 (2), 92-110, 2020
12020
Het succes van social engineering
JW Bullée, L Montoya, M Junger, P Hartel
Tijdschrift voor veiligheid 17 (1-2), 40-53, 2018
12018
Does trainer gender make a difference when delivering phishing training? A new experimental design to capture bias
A Palheiros Da Silva, W Mbaka, J Mayer, JW Bullee, K Tuma
Proceedings of the 28th International Conference on Evaluation and …, 2024
2024
Nieuwe vormen van oplichting en fraude
C Meerts, W Huisman, J Rooyakkers, M Weulen Kranenbarg, R Roks, ...
Boom juridisch, 2020
2020
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20