Follow
Jan-Willem H. Bullee
Jan-Willem H. Bullee
PhD
Verified email at utwente.nl
Title
Cited by
Cited by
Year
The persuasion and security awareness experiment: reducing the success of social engineering attacks
JWH Bullée, L Montoya, W Pieters, M Junger, PH Hartel
Journal of experimental criminology 11, 97-115, 2015
1472015
On the anatomy of social engineering attacks—A literature‐based dissection of successful attacks
JWH Bullée, L Montoya, W Pieters, M Junger, P Hartel
Journal of investigative psychology and offender profiling 15 (1), 20-45, 2018
822018
Spear phishing in organisations explained
JW Bullee, L Montoya, M Junger, P Hartel
Information & Computer Security 25 (5), 593-613, 2017
782017
Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention
JW Bullée, L Montoya, M Junger, PH Hartel
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 107-114, 2016
342016
How effective are social engineering interventions? A meta-analysis
JW Bullee, M Junger
Information & Computer Security 28 (5), 801-830, 2020
312020
Tangible modelling to elicit domain knowledge: an experiment and focus group
D Ionita, R Wieringa, JW Bullee, A Vasenev
Conceptual Modeling: 34th International Conference, ER 2015, Stockholm …, 2015
162015
Argumentation-based security requirements elicitation: The next round
D Ionita, JW Bullee, RJ Wieringa
2014 IEEE 1st International Workshop on Evolving Security and Privacy …, 2014
162014
Social engineering
JW Bullée, M Junger
The Palgrave Handbook of International Cybercrime and Cyberdeviance, 849-875, 2020
152020
Experimental social engineering: Investigation and prevention
JW Bullee
132017
Technology-supported Risk Estimation by Predictive Assessment of Socio-technical Security
L Coles-Kemp, JW Bullée, L Montoya, M Junger, CP Heath, W Pieters, ...
42015
Investigating the usability and utility of tangible modelling of socio-technical architectures
D Ionita, R Wieringa, JW Bullee, A Vasenev
University of Twente, Enschede, Netherlands, 2015
42015
Physical location of smart key activators–a building security penetration test
JW Bullee, L Montoya, M Junger, P Hartel
Journal of Corporate Real Estate 20 (2), 138-151, 2018
32018
Regression Nodes: Extending attack trees with data from social sciences
JWH Bullée, L Montoya, W Pieters, M Junger, PH Hartel
2015 Workshop on Socio-Technical Aspects in Security and Trust, 17-23, 2015
32015
Social engineering: digitale fraude en misleiding
JW Bullée, M Junger
Justitiele Verkenningen 46 (2), 2020
22020
Detection of leadership in informal (small) groups based on CCTV information
JW Bullée
University of Twente, 2013
22013
First Steps to Improve Cybersecurity Behaviour–a Virtual Reality Experience
L Klooster, R Van Delden, JW Bullée
Proceedings of the 17th European Conference on Game-Based Learning: ECGBL 2023, 2023
12023
Het succes van social engineering
JW Bullée, L Montoya, M Junger, P Hartel
Tijdschrift voor veiligheid 17 (1-2), 40-53, 2018
12018
Social engineering: digitale fraude en misleiding: een meta-analyse van studies naar de effectiviteit van interventies
JWH Bullee, M Junger
Justitiële verkenningen 46 (2), 92-110, 2020
2020
Nieuwe vormen van oplichting en fraude
C Meerts, W Huisman, J Rooyakkers, M Weulen Kranenbarg, R Roks, ...
Boom juridisch, 2020
2020
Biometric features and privacy
JW Bullée, R Veldhuis
Information Theory in the Benelux and The 2rd Joint WIC/IEEE Symposium on …, 2012
2012
The system can't perform the operation now. Try again later.
Articles 1–20