Marianne Junger

Marianne Junger
University of Twente | UT · DEPARTMENT INDUSTRIAL ENGINEERING AND BUSINESS INFORMATION SYSTEMS (IEBIS)

Ph. D.

About

253
Publications
99,988
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,573
Citations
Introduction
Skills and Expertise
Additional affiliations
January 2010 - December 2012
University of Twente
January 2001 - December 2012
Utrecht University

Publications

Publications (253)
Preprint
Full-text available
We investigate the utilization of private communication platforms by underground forum users. We aim to bridge the knowledge gap regarding user preferences for communication platforms employed for private conversations within illicit contexts. We employ social network analysis, topic modeling and statistical analysis on over 7.5 million posts and 2...
Article
Full-text available
Fraud against individuals is a major and growing problem. Understanding why some people fall victim to fraud, while others do not, is crucial in developing effective prevention strategies. We therefore studied the effect of socio-demographics, personality traits, mental, general, and cognitive health, routine Internet activities, and prior fraud kn...
Article
Full-text available
The purpose of this study war to look for causes of women's fear of crime. It was hypothesised that experiences of sexual harassment, which usually are not serious but could occur relatively often, can lead women to be fearful and restrict themselves to their homes. A distinction was made between victimisation inside the family and outside the fami...
Article
Full-text available
Aim Research on deception detection has usually been executed in experimental settings in the laboratory. In contrast, the present research investigates deception detection by actual victims and near victims of fraud, as reported in their own words. Materials and methods Our study is based on a nationally representative survey of 11 types of (most...
Chapter
Full-text available
The aim of this chapter is to discuss two methods of measuring ‘cyber crime’: the officially registered reports from the police and the victim surveys. We conclude with issues and tips for measuring cyber crime
Article
Full-text available
To design preventive policy measures for email phishing, it is helpful to be aware of the phishing schemes and trends that are currently applied. How phishing schemes and patterns emerge and adapt is an ongoing field of study. Existing phishing works already reveal a rich set of phishing schemes, patterns, and trends that provide insight into the m...
Chapter
Full-text available
The issues we encounter to measure cyber crime victimization are illustrated in our study
Conference Paper
Full-text available
In recent years, ransomware attacks have led to disastrous consequences for victims, not just due to the payment ransom amount but also due to the recovery costs associated with these attacks. So far only a few empirical studies have analysed the financial impact of ransomware attacks. This study aims to understand the expected financial gains for...
Poster
Full-text available
Ransomware may lead to massive economic damage to victims [13]. However, it is still unclear how attackers determine the amount of ransom. In this poster we empirically study the ransom requested by attackers in ransomware attacks. We analysed 371 ransomware attacks reported to the Dutch Police between 2019 and 2021. Our results indicate that attac...
Article
Full-text available
Research on the privacy paradox shows that ICT users have serious concerns about their online privacy but often do not behave accordingly. Most insights, however, are based on research among lay users. It is unclear whether users with high expertise on online privacy and cybersecurity would show similar discrepancies between concerns and behavior....
Article
Full-text available
Background: Many countries mandate transparency and consent when personal data are handled by online services. However, most users do not read privacy policies or cannot understand them. An important challenge for technical communicators is empowering users to manage their online privacy responsibly. Literature review: Research suggests that privac...
Chapter
Full-text available
A description of adolescents mobile phone ownership and use.
Chapter
Full-text available
A literature review on the topic of 'social engineering' in Security.
Chapter
Full-text available
I review the literature on children's' unintentional injuries and their link with problem behavior.
Article
Full-text available
Situational factors affect human behavior, among which dishonesty. Previous studies linked darkness to an increase in immoral behavior. Simultaneously, ‘dark mode’ is increasingly offered in software. Accordingly it is important to investigate the moral behavioral effects of dark mode. In a high-powered, pre-registered, and economically incentivize...
Technical Report
Full-text available
In dit specialistische onderzoek is gezocht naar het bestaan van online misdaadketens ofwel ‘crime chains’. Misdaadketens zijn omschreven als reeksen van verschillende type delicten die samen of in een bepaalde volgorde voorkomen en met elkaar verband houden om een gecoördineerde reeks acties uit te voeren. De huidige studie onderzoekt of er een st...
Poster
Full-text available
Smartphone users install apps for various purposes. Before getting hands-on over the functionality of a desired app, a user must give several types of permissions such as access to camera, gallery, messages etc. Since giving app permission expose users to phone security and user privacy, this study seeks to investigate the user emotional experience...
Article
Full-text available
Purpose Social engineering is a prominent aspect of online crime. Various interventions have been developed to reduce the success of this type of attacks. This paper aims to investigate if interventions can help to decrease the vulnerability to social engineering attacks. If they help, the authors investigate which forms of interventions and specif...
Article
Full-text available
(Published by BMC Crime Science - 9th July 2020) This study analyses 300 cases of fraudulent activities against Dutch businesses, 100 from each of the following three categories: CEO-fraud, fraudulent contract, and ghost invoice. We examine crime scripts, key characteristics of targeted businesses, and the relationship between input criminal effort...
Article
Full-text available
Dishonesty is prevalent and causes great damage to society. On an individual level, besides reaping rewards, it also carries a psychological cost for those who engage in it. This principle is used to make people more honest with behavioral interventions, one of them being the well-known ‘signature nudge’. Digital transition in society has however l...
Article
Full-text available
The prevalence of online crime increases. Social engineering, such as email phishing, is often an important element in an attack. Several interventions have been developed to reduce the success of these types of attacks. The current study investigates whether interventions can help reduce vulnerability to social engineering attacks. The authors inv...
Article
Full-text available
Reliable availability to the internet and internet-based services is crucial in today's world. DDoS attacks pose a severe threat to the availability of such online resources-especially owing to booters-virtually everyone can execute them nowadays. In order to appropriately protect oneself against such attacks, it is essential to have a good insight...
Chapter
Full-text available
We review the research on social engineering in cybersecurity
Chapter
Full-text available
Distributed denial of service (DDoS) attacks pose a serious threat to the availability of online resources. In this paper, we analyse the attacker aims for the use of DDoS attacks. We propose a model that can be used to evaluate news articles for determining probable aims of attackers. Thereafter, we apply this model to evaluate 27 distinct attack...
Article
Full-text available
Studying ethnic minorities in relation to crime and police discrimination answer to bowling.
Preprint
Full-text available
Laptops have become an indispensable asset in today's digital age. They often contain highly sensitive information, such as credentials and confidential documents. As a result, the value of a laptop is an accumulation of the value of both the physical device itself and the cyber assets it contains, making it a lucrative target for theft. Educationa...
Article
Full-text available
The current study explored the psychometric properties of a parent-child interaction observation system, the Dyadic Parent-Child Interaction Coding System (DPICS) in the Netherlands. Participants included 31 Dutch mother-child dyads and 86 U.S. mother-child dyads for a community sample (2–7 years; 50% boys). Good one-week test-retest reliability wa...
Article
Full-text available
Research shows that people's use of computers and mobile phones is often characterized by a privacy paradox: Their self-reported concerns about their online privacy appear to be in contradiction with their often careless online behaviors. Earlier research into the privacy paradox has a number of caveats. Most studies focus on intentions rather than...
Chapter
Full-text available
We describe the contribution of computer science to Crime Science
Article
Full-text available
Introduction: This study is aimed at gaining more insight into the effects of camera-surveillance on behavior. It investigates the effects of three different ways of “framing” camera presence on cheating behavior and pro-social behavior. First, we explore the effect of presenting the camera as the medium through which an intimidating authority watc...
Data
A classification tree with the dependent variable “cheating overall,” and as independent variables the camera conditions (manipulation) “no camera,” “neutral camera,” “authority watching,” and “self-observation,” plus the personality traits LOC, locus of control; NA, need for approval; SM, self-monitoring; SVO, social; value orientation.
Data
In total, 10 of the 86 participants cheated, and 12 guessed answers after the time they were allowed to work on the puzzles was up. This table illustrates how these numbers are distributed amongst the conditions, and gives an overview of all different types of cheating. As can be derived from the table below, two participants used more than one typ...
Article
This article studies the relationship between Twitter use by community policing officers and its impact on citizens’ safety perceptions. A model has been tested using data from a relatively large-scale survey study. A small positive impact of Twitter use has been found on judgments about the police. Citizens following the police via Twitter do not...
Article
Social engineering is the usage of social manipulation and psychological tricks to make the targets assist offenders in their attack. This paper aimed to discuss the success of social engineering attacks and interventions in an organisational setting. Three kinds of social engineering experiments were discussed, each using a different modality (i.e...
Article
Full-text available
Purpose When security managers choose to deploy a smart lock activation system, the number of units needed and their location needs to be established. This study aims to present the results of a penetration test involving smart locks in the context of building security. The authors investigated how the amount of effort an employee has to invest in...
Article
Full-text available
Objectives Review the evidence provided by victim surveys in order to provide a rough estimate of the personal crime prevalence of the main types of cybercrime. Methods We performed a search in databases, searched online, and contacted several Offices for National Statistics in Europe and selected surveys that provided information about individual...
Article
Full-text available
A number of studies have evaluated associations between parenting practices, adolescent self-control, and adolescent antisocial behavior. Yet, few studies have examined associations between these constructs in early childhood or examined the extent to which both maternal and paternal self-control shapes them. To address these gaps, the current stud...
Article
Full-text available
Purpose The purpose of this study is to explore how the opening phrase of a phishing email influences the action taken by the recipient. Design/methodology/approach Two types of phishing emails were sent to 593 employees, who were asked to provide personally identifiable information (PII). A personalised spear phishing email opening was randomly...
Article
Full-text available
Background Large differences in substance use between educational levels originate at a young age, but there is limited evidence explaining these inequalities. The aim of this study was to test whether a) smoking and binge drinking are associated with lower levels of self-control and cognitive functioning, and b) associations between educational tr...
Article
Full-text available
The aim of this study was to explore the extent to which persuasion principles are used in successful social engineering attacks. Seventy-four scenarios were extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenario was split into attack steps, containing single interactions between offender and target....
Conference Paper
Full-text available
User training is a commonly used method for preventing victimization from phishing attacks. In this study, we focus on training children, since they are active online but often overlooked in interventions. We present an experiment in which children at Dutch primary schools received an antiphishing training. The subjects were subsequently tested for...
Article
Full-text available
Today's adolescents grow up using information and communication technologies as an integral part of their everyday life. This affords them with extensive opportunities, but also exposes them to online risks, such as cybergrooming and cyberbullying victimization. The aims of this study were to investigate correlates of cybergrooming and cyberbullyin...
Article
Full-text available
Marcus Felson Crime and Everyday Life. Texas State University and Mary Eckert—MA Eckert Consulting, LLC, 2016. SAGE Publications, Inc., 240 pages
Article
Full-text available
Parent management training programs have proven the most effective way to treat child behavior problems. This study reports on an effectiveness trial of a community-based implementation of Parent–Child Interaction Therapy (PCIT) in comparison with the Dutch-developed Family Creative Therapy (FCT). Forty-five children (58 % boys) aged between 32 and...
Article
Purpose This study aimed at gaining more insight into the combined influence of environmental factors and personal vulnerability to environmental cues on cheating behaviour in a task‐related indoor setting. We propose that a disorderly environment increases cheating as it implicitly signals that undesirable behaviours are common. Camera presence is...
Poster
Full-text available
Background: Alexithymia involves difficulty identifying, describing and interpreting emotions. The awareness of one’s emotions can prevent aggressive and uncontrolled emotional reactions (Levenson, 1999). Indeed, there is some empirical evidence that alexithymia is related to increased expressions of anger and higher aggressions (Payer, Lieberman &...
Article
Full-text available
The present study reports frequency rates of cybergrooming, profiled characteristics of cybergrooming perpetrators, and examine direct and indirect associations between cyberbullying victimization, self-esteem, and cybergrooming victimization. The study sample included 2,162 adolescents between 11 and 19 years from three Western (Germany, the Nethe...
Conference Paper
Full-text available
The objective of this study is to evaluate the effectiveness of an information campaign to counter a social engineering attack via the telephone. Four different offenders phoned 48 employees and made them believe that their PC was distributing spam emails. Targets were told that this situation could be solved by downloading and executing software f...
Conference Paper
Full-text available
In the field of security, attack trees are often used to assess security vulnerabilities probabilistically in relation to multi-step attacks. The nodes are usually connected via AND-gates, where all children must be executed, or via OR-gates, where only one action is necessary for the attack step to succeed. This logic, however, is not suitable for...
Conference Paper
Full-text available
In the field of security, attack trees are often used to assess security vulnerabilities probabilistically in relation to multi-step attacks. The nodes are usually connected via AND-gates, where all children must be executed, or via OR-gates, where only one action is necessary for the attack step to succeed. This logic, however, is not suitable for...
Article
Full-text available
The Eyberg Child Behavior Inventory (ECBI) is an established parent rating scale to measure disruptive behavior problems in children aged between 2 and 16 years. The present study examined the psychometric properties of the Dutch translation, including analysis on the one-dimensional structure of the ECBI scales using item response theory. Data fro...
Article
Full-text available
Objectives The aim of the current study is to explore to what extent an intervention reduces the effects of social engineering (e.g., the obtaining of access via persuasion) in an office environment. In particular, we study the effect of authority during a ‘social engineering’ attack. Methods Thirty-one different ‘offenders’ visited the offices of...
Article
Full-text available
This study (1) reports frequency rates of mutually exclusive traditional, cyber and combined (both traditional and cyber) bullying roles; and (2) investigates whether adolescents belonging to particular bullying roles show higher levels of involvement in risky online activities (Compulsive Internet Use (CIU), online grooming victimization, and sext...
Article
What is already known on this subject The European Union Directive on cross-border health care places an obligation on MSs to establish one or more NCPs. Although the Directive does not explicitly require MSs to provide NCP websites, 18 MSs have done so, and a further three websites are in the process of development. What this study adds We asked w...
Article
Full-text available
This article examines how residential property and its surroundings influence day- and night-time residential burglary. Crime Prevention Through Environmental Design (CPTED) principles of territoriality, surveillance, access control, target hardening, image maintenance, and activity support underpin the study. Data were collected by observing 851 h...
Poster
Full-text available
Differences in risky online and offline activities between traditional, cyber- and combined bullying roles
Article
Background: Adverse health-related behaviours (HRBs) have been shown to co-occur in adolescents. Evidence lacks on factors associated with these co-occurring HRBs. The Theory of Triadic Influence (TTI) offers a route to categorize these determinants according to type (social, cultural and intrapersonal) and distance in the causal pathway (ultimate...
Article
Abstract Objective: Multiple studies have identified clusters of co-occurring health-related behaviours. Little is known, however, about factors associated with such clusters. This study aims to identify these factors and to assess whether their effects are in accordance with the Theory of Triadic Influence (TTI). Design: A cross-sectional study us...
Conference Paper
Full-text available