Regression Nodes: Extending Attack Trees with Data from Social Sciences

Jan-Willem H. Bullee , Lorena Montoya , Wolter Pieters , Marianne Junger
2015 Workshop on Socio-Technical Aspects in Security and Trust 17 -23

2
2015
On the anatomy of social engineering attacks-A literature-based dissection of successful attacks

Jan-Willem Hendrik Bullée , Lorena Montoya , Wolter Pieters , Marianne Junger
Journal of Investigative Psychology and Offender Profiling 15 ( 1) 20 -45

13
2018
The persuasion and security awareness experiment: reducing the success of social engineering attacks

Jan-Willem H. Bullée , Lorena Montoya , Wolter Pieters , Marianne Junger
Journal of Experimental Criminology 11 ( 1) 97 -115

131
2015
Biometric features and privacy : condemned, based upon your finger print

Jan-Willem Bullee , Raymond Veldhuis
33rd WIC Symposium on Information Theory in the Benelux and the 2nd Joint WIC/IEEE Symposium on Information Theory and Signal Processing in the Benelux 2012 44 -51

1
2012
Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention

Jan-Willem Bullee , Lorena Montoya , Marianne Junger , Pieter H. Hartel
SG-CRC 107 -114

8
2016
Experimental social engineering : investigation and prevention

Jan-Willem Bullee
University Library/University of Twente

5
2017
Argumentation-based security requirements elicitation: The next round

Dan Ionita , Jan-Willem Bullee , Roel J. Wieringa
IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE 2014), Karlskrona, Sweden: Proceedings of the 2014 IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE) 7 -12

8
2014
Physical Location of Smart Key Activators : A Building Security Penetration Test

Jan-Willem Bullee , Lorena Montoya , Marianne Junger , Pieter Hartel
Journal of Corporate Real Estate 20 ( 2) 138 -151

1
2018
Tangible modelling to elicit domain knowledge: an experiment and focus group

Dan Ionita , Roel Wieringa , Jan-Willem Bullee , Alexandr Vasenev
Conceptual Modeling: 34th International Conference, ER 2015, Stockholm, Sweden, October 19-22, 2015, Proceedings 34 558 -565

17
2015
Investigating the usability and utility of tangible modelling of socio-technical architectures

Dan Ionita , Roel Wieringa , Jan-Willem Bullee , Alexandr Vasenev
University of Twente, Enschede, Netherlands

4
2015
Spear phishing in organisations explained

Jan-Willem Bullee , Lorena Montoya , Marianne Junger , Pieter Hartel
Information & Computer Security 25 ( 5) 593 -613

81
2017
Does trainer gender make a difference when delivering phishing training? A new experimental design to capture bias

André Palheiros Da Silva , Winnie Mbaka , Johann Mayer , Jan-Willem Bullee
130 -139

2024
How effective are social engineering interventions? A meta-analysis

Jan-Willem Bullee , Marianne Junger
Information & Computer Security 28 ( 5) 801 -830

37
2020
Het succes van social engineering

Jan-Willem Bullée , Lorena Montoya , Marianne Junger , Pieter Hartel
Tijdschrift voor veiligheid 17 40 -53

2018
2020
Biometric features and privacy

Jan-Willem Bullée , Raymond Veldhuis
Information Theory in the Benelux and The 2rd Joint WIC/IEEE Symposium on Information Theory and Signal Processing in the Benelux 44 -44

2012
First Steps to Improve Cybersecurity Behaviour–a Virtual Reality Experience

Lara Klooster , Robby Van Delden , Jan-Willem Bullée
Proceedings of the 17th European Conference on Game-Based Learning: ECGBL 2023

3
2023
Social engineering: digitale fraude en misleiding

Jan-Willem Bullée , Marianne Junger
Justitiele Verkenningen 46 ( 2)

2
2020
Social engineering

Jan-Willem Bullée , Marianne Junger
The Palgrave Handbook of International Cybercrime and Cyberdeviance 849 -875

15
2020