Follow
Jan-Willem H. Bullee
Jan-Willem H. Bullee
PhD
Verified email at utwente.nl
Title
Cited by
Cited by
Year
The persuasion and security awareness experiment: reducing the success of social engineering attacks
JWH Bullée, L Montoya, W Pieters, M Junger, PH Hartel
Journal of experimental criminology 11, 97-115, 2015
1302015
On the anatomy of social engineering attacks—A literature‐based dissection of successful attacks
JWH Bullée, L Montoya, W Pieters, M Junger, P Hartel
Journal of investigative psychology and offender profiling 15 (1), 20-45, 2018
682018
Spear phishing in organisations explained
JW Bullee, L Montoya, M Junger, P Hartel
Information & Computer Security 25 (5), 593-613, 2017
532017
Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention
JW Bullée, L Montoya, M Junger, PH Hartel
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 107-114, 2016
252016
Argumentation-based security requirements elicitation: The next round
D Ionita, JW Bullee, RJ Wieringa
2014 IEEE 1st International Workshop on Evolving Security and Privacy …, 2014
172014
Tangible modelling to elicit domain knowledge: an experiment and focus group
D Ionita, R Wieringa, JW Bullee, A Vasenev
Conceptual Modeling: 34th International Conference, ER 2015, Stockholm …, 2015
162015
How effective are social engineering interventions? A meta-analysis
JW Bullee, M Junger
Information & Computer Security 28 (5), 801-830, 2020
142020
Experimental social engineering: investigation and prevention
JW Bullee
122017
Social engineering
JW Bullée, M Junger
The Palgrave Handbook of International Cybercrime and Cyberdeviance, 849-875, 2020
72020
Technology-supported Risk Estimation by Predictive Assessment of Socio-technical Security
L Coles-Kemp, JW Bullée, L Montoya, M Junger, CP Heath, W Pieters, ...
42015
Physical location of smart key activators–a building security penetration test
JW Bullee, L Montoya, M Junger, P Hartel
Journal of Corporate Real Estate 20 (2), 138-151, 2018
32018
Regression Nodes: Extending attack trees with data from social sciences
JWH Bullée, L Montoya, W Pieters, M Junger, PH Hartel
2015 Workshop on Socio-Technical Aspects in Security and Trust, 17-23, 2015
32015
Investigating the usability and utility of tangible modelling of socio-technical architectures
D Ionita, R Wieringa, JW Bullee, A Vasenev
CTIT Technical Report Series, 2015
32015
Social engineering: digitale fraude en misleiding
JW Bullée, M Junger
Justitiele Verkenningen 46 (2), 2020
22020
Detection of leadership in informal (small) groups based on CCTV information
JW Bullée
University of Twente, 2013
22013
Het succes van social engineering
JW Bullée, L Montoya, M Junger, P Hartel
Tijdschrift voor veiligheid 17 (1-2), 40-53, 2018
12018
Experimental social engineering
JW Bullee
Unpublished doctoral dissertation, University of Twente, Netherlands, 2017
12017
Social engineering: digitale fraude en misleiding: een meta-analyse van studies naar de effectiviteit van interventies
JWH Bullee, M Junger
Justitiële verkenningen 46 (2), 92-110, 2020
2020
Nieuwe vormen van oplichting en fraude
C Meerts, W Huisman, J Rooyakkers, M Weulen Kranenbarg, R Roks, ...
Boom juridisch, 2020
2020
Biometric features and privacy
JW Bullée, R Veldhuis
Information Theory in the Benelux and The 2rd Joint WIC/IEEE Symposium on …, 2012
2012
The system can't perform the operation now. Try again later.
Articles 1–20