About
253
Publications
99,988
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,573
Citations
Introduction
Skills and Expertise
Additional affiliations
January 2010 - December 2012
January 2001 - December 2012
January 1996 - present
Publications
Publications (253)
We investigate the utilization of private communication platforms by underground forum users. We aim to bridge the knowledge gap regarding user preferences for communication platforms employed for private conversations within illicit contexts. We employ social network analysis, topic modeling and statistical analysis on over 7.5 million posts and 2...
Fraud against individuals is a major and growing problem. Understanding why some people fall victim to fraud, while others do not, is crucial in developing effective prevention strategies. We therefore studied the effect of socio-demographics, personality traits, mental, general, and cognitive health, routine Internet activities, and prior fraud kn...
The purpose of this study war to look for causes of women's fear of crime. It was hypothesised that experiences of sexual harassment, which usually are not serious but could occur relatively often, can lead women to be fearful and restrict themselves to their homes. A distinction was made between victimisation inside the family and outside the fami...
Aim
Research on deception detection has usually been executed in experimental settings in the laboratory. In contrast, the present research investigates deception detection by actual victims and near victims of fraud, as reported in their own words.
Materials and methods
Our study is based on a nationally representative survey of 11 types of (most...
The aim of this chapter is to discuss two methods of measuring ‘cyber crime’: the
officially registered reports from the police and the victim surveys. We conclude with issues and tips for measuring cyber crime
To design preventive policy measures for email phishing, it is helpful to be aware of the phishing schemes and trends that are currently applied. How phishing schemes and patterns emerge and adapt is an ongoing field of study. Existing phishing works already reveal a rich set of phishing schemes, patterns, and trends that provide insight into the m...
The issues we encounter to measure cyber crime victimization are illustrated in our study
In recent years, ransomware attacks have led to disastrous consequences for victims, not just due to the payment ransom amount but also due to the recovery costs associated with these attacks. So far only a few empirical studies have analysed the financial impact of ransomware attacks. This study aims to understand the expected financial gains for...
Ransomware may lead to massive economic damage to victims [13]. However, it is still unclear how attackers determine the amount of ransom. In this poster we empirically study the ransom requested by attackers in ransomware attacks. We analysed 371 ransomware attacks reported to the Dutch Police between 2019 and 2021. Our results indicate that attac...
Research on the privacy paradox shows that ICT users have serious concerns about their online privacy but often do not behave accordingly. Most insights, however, are based on research among lay users. It is unclear whether users with high expertise on online privacy and cybersecurity would show similar discrepancies between concerns and behavior....
Background: Many countries mandate transparency and consent when personal data are handled by online services. However, most users do not read privacy policies or cannot understand them. An important challenge for technical communicators is empowering users to manage their online privacy responsibly. Literature review: Research suggests that privac...
A description of adolescents mobile phone ownership and use.
A literature review on the topic of 'social engineering' in Security.
I review the literature on children's' unintentional injuries and their link with problem behavior.
Situational factors affect human behavior, among which dishonesty. Previous studies linked darkness to an increase in immoral behavior. Simultaneously, ‘dark mode’ is increasingly offered in software. Accordingly it is important to investigate the moral behavioral effects of dark mode. In a high-powered, pre-registered, and economically incentivize...
In dit specialistische onderzoek is gezocht naar het bestaan van online misdaadketens ofwel ‘crime chains’. Misdaadketens zijn omschreven als reeksen van verschillende type delicten die samen of in een bepaalde volgorde voorkomen en met elkaar verband houden om een gecoördineerde reeks acties uit te voeren. De huidige studie onderzoekt of er een st...
Smartphone users install apps for various purposes. Before getting hands-on over the functionality of a desired app, a user must give several types of permissions such as access to camera, gallery, messages etc. Since giving app permission expose users to phone security and user privacy, this study seeks to investigate the user emotional experience...
Purpose
Social engineering is a prominent aspect of online crime. Various interventions have been developed to reduce the success of this type of attacks. This paper aims to investigate if interventions can help to decrease the vulnerability to social engineering attacks. If they help, the authors investigate which forms of interventions and specif...
(Published by BMC Crime Science - 9th July 2020)
This study analyses 300 cases of fraudulent activities against Dutch businesses, 100 from each of the following three categories: CEO-fraud, fraudulent contract, and ghost invoice. We examine crime scripts, key characteristics of targeted businesses, and the relationship between input criminal effort...
Dishonesty is prevalent and causes great damage to society. On an individual level, besides reaping rewards, it also carries a psychological cost for those who engage in it. This principle is used to make people more honest with behavioral interventions, one of them being the well-known ‘signature nudge’. Digital transition in society has however l...
The prevalence of online crime increases. Social engineering, such as email phishing, is often an important element in an attack. Several interventions have been developed to reduce the success of these types of attacks. The current study investigates whether interventions can help reduce vulnerability to social engineering attacks. The authors inv...
Reliable availability to the internet and internet-based services is crucial in today's world. DDoS attacks pose a severe threat to the availability of such online resources-especially owing to booters-virtually everyone can execute them nowadays. In order to appropriately protect oneself against such attacks, it is essential to have a good insight...
We review the research on social engineering in cybersecurity
Distributed denial of service (DDoS) attacks pose a serious threat to the availability of online resources. In this paper, we analyse the attacker aims for the use of DDoS attacks. We propose a model that can be used to evaluate news articles for determining probable aims of attackers. Thereafter, we apply this model to evaluate 27 distinct attack...
Studying ethnic minorities in relation to crime and police discrimination answer to bowling.
Laptops have become an indispensable asset in today's digital age. They often contain highly sensitive information, such as credentials and confidential documents. As a result, the value of a laptop is an accumulation of the value of both the physical device itself and the cyber assets it contains, making it a lucrative target for theft. Educationa...
The current study explored the psychometric properties of a parent-child interaction observation system, the Dyadic Parent-Child Interaction Coding System (DPICS) in the Netherlands. Participants included 31 Dutch mother-child dyads and 86 U.S. mother-child dyads for a community sample (2–7 years; 50% boys). Good one-week test-retest reliability wa...
Research shows that people's use of computers and mobile phones is often characterized by a privacy paradox: Their self-reported concerns about their online privacy appear to be in contradiction with their often careless online behaviors. Earlier research into the privacy paradox has a number of caveats. Most studies focus on intentions rather than...
We describe the contribution of computer science to Crime Science
Introduction: This study is aimed at gaining more insight into the effects of camera-surveillance on behavior. It investigates the effects of three different ways of “framing” camera presence on cheating behavior and pro-social behavior. First, we explore the effect of presenting the camera as the medium through which an intimidating authority watc...
A classification tree with the dependent variable “cheating overall,” and as independent variables the camera conditions (manipulation) “no camera,” “neutral camera,” “authority watching,” and “self-observation,” plus the personality traits LOC, locus of control; NA, need for approval; SM, self-monitoring; SVO, social; value orientation.
In total, 10 of the 86 participants cheated, and 12 guessed answers after the time they were allowed to work on the puzzles was up. This table illustrates how these numbers are distributed amongst the conditions, and gives an overview of all different types of cheating. As can be derived from the table below, two participants used more than one typ...
This article studies the relationship between Twitter use by community policing officers and its impact on citizens’ safety perceptions. A model has been tested using data from a relatively large-scale survey study. A small positive impact of Twitter use has been found on judgments about the police. Citizens following the police via Twitter do not...
Social engineering is the usage of social manipulation and psychological tricks to make the targets assist offenders in their attack. This paper aimed to discuss the success of social engineering attacks and interventions in an organisational setting. Three kinds of social engineering experiments were discussed, each using a different modality (i.e...
Purpose
When security managers choose to deploy a smart lock activation system, the number of units needed and their location needs to be established. This study aims to present the results of a penetration test involving smart locks in the context of building security. The authors investigated how the amount of effort an employee has to invest in...
Objectives
Review the evidence provided by victim surveys in order to provide a rough estimate of the personal crime prevalence of the main types of cybercrime.
Methods
We performed a search in databases, searched online, and contacted several Offices for National Statistics in Europe and selected surveys that provided information about individual...
A number of studies have evaluated associations between parenting practices, adolescent self-control, and adolescent antisocial behavior. Yet, few studies have examined associations between these constructs in early childhood or examined the extent to which both maternal and paternal self-control shapes them. To address these gaps, the current stud...
Purpose
The purpose of this study is to explore how the opening phrase of a phishing email influences the action taken by the recipient.
Design/methodology/approach
Two types of phishing emails were sent to 593 employees, who were asked to provide personally identifiable information (PII). A personalised spear phishing email opening was randomly...
Background
Large differences in substance use between educational levels originate at a young age, but there is limited evidence explaining these inequalities. The aim of this study was to test whether a) smoking and binge drinking are associated with lower levels of self-control and cognitive functioning, and b) associations between educational tr...
The aim of this study was to explore the extent to which persuasion principles are used in successful social engineering attacks. Seventy-four scenarios were extracted from 4 books on social engineering (written by
social engineers) and analysed. Each scenario was split into attack steps, containing single interactions between offender and target....
User training is a commonly used method for preventing
victimization from phishing attacks. In this study, we focus
on training children, since they are active online but often
overlooked in interventions. We present an experiment in
which children at Dutch primary schools received an antiphishing
training. The subjects were subsequently tested for...
Today's adolescents grow up using information and communication technologies as an integral part of their everyday life. This affords them with extensive opportunities, but also exposes them to online risks, such as cybergrooming and cyberbullying victimization. The aims of this study were to investigate correlates of cybergrooming and cyberbullyin...
Marcus Felson Crime and Everyday Life. Texas State University and Mary Eckert—MA Eckert Consulting, LLC, 2016. SAGE Publications, Inc., 240 pages
Parent management training programs have proven the most effective way to treat child behavior problems. This study reports on an effectiveness trial of a community-based implementation of Parent–Child Interaction Therapy (PCIT) in comparison with the Dutch-developed Family Creative Therapy (FCT). Forty-five children (58 % boys) aged between 32 and...
Purpose
This study aimed at gaining more insight into the combined influence of environmental factors and personal vulnerability to environmental cues on cheating behaviour in a task‐related indoor setting. We propose that a disorderly environment increases cheating as it implicitly signals that undesirable behaviours are common. Camera presence is...
Background: Alexithymia involves difficulty identifying, describing and interpreting emotions. The awareness of one’s emotions can prevent aggressive and uncontrolled emotional reactions (Levenson, 1999). Indeed, there is some empirical evidence that alexithymia is related to increased expressions of anger and higher aggressions (Payer, Lieberman &...
The present study reports frequency rates of cybergrooming, profiled characteristics of cybergrooming perpetrators, and examine direct and indirect associations between cyberbullying victimization, self-esteem, and cybergrooming victimization. The study sample included 2,162 adolescents between 11 and 19 years from three Western (Germany, the Nethe...
The objective of this study is to evaluate the effectiveness of an information campaign to counter a social engineering attack via the telephone. Four different offenders phoned 48 employees and made them believe that their PC was distributing spam emails. Targets were told that this situation could be solved by downloading and executing software f...
In the field of security, attack trees are often used to assess security vulnerabilities probabilistically in relation to multi-step attacks. The nodes are usually connected via AND-gates, where all children must be executed, or via OR-gates, where only one action is necessary for the attack step to succeed. This logic, however, is not suitable for...
In the field of security, attack trees are often used to assess security vulnerabilities probabilistically in relation to multi-step attacks. The nodes are usually connected via AND-gates, where all children must be executed, or via OR-gates, where only one action is necessary for the attack step to succeed. This logic, however, is not suitable for...
The Eyberg Child Behavior Inventory (ECBI) is an established parent rating scale to measure disruptive behavior problems in children aged between 2 and 16 years. The present study examined the psychometric properties of the Dutch translation, including analysis on the one-dimensional structure of the ECBI scales using item response theory. Data fro...
Objectives The aim of the current study is to explore to what extent an intervention reduces the effects of social engineering (e.g., the obtaining of access via persuasion) in an office environment. In particular, we study the effect of authority during a ‘social engineering’ attack. Methods Thirty-one different ‘offenders’ visited the offices of...
This study (1) reports frequency rates of mutually exclusive traditional, cyber and combined (both traditional and cyber) bullying roles; and (2) investigates whether adolescents belonging to particular bullying roles show higher levels of involvement in risky online activities (Compulsive Internet Use (CIU), online grooming victimization, and sext...
What is already known on this subject The European Union Directive on cross-border health care places an obligation on MSs to establish one or more NCPs. Although the Directive does not explicitly require MSs to provide NCP websites, 18 MSs have done so, and a further three websites are in the process of development. What this study adds We asked w...
This article examines how residential property and its surroundings influence day- and night-time residential burglary. Crime Prevention Through Environmental Design (CPTED) principles of territoriality, surveillance, access control, target hardening, image maintenance, and activity support underpin the study. Data were collected by observing 851 h...
Differences in risky online and offline activities between traditional, cyber- and combined bullying roles
Background:
Adverse health-related behaviours (HRBs) have been shown to co-occur in adolescents. Evidence lacks on factors associated with these co-occurring HRBs. The Theory of Triadic Influence (TTI) offers a route to categorize these determinants according to type (social, cultural and intrapersonal) and distance in the causal pathway (ultimate...
Abstract Objective: Multiple studies have identified clusters of co-occurring health-related behaviours. Little is known, however, about factors associated with such clusters. This study aims to identify these factors and to assess whether their effects are in accordance with the Theory of Triadic Influence (TTI). Design: A cross-sectional study us...