Marianne Junger

Orcid: 0000-0002-9515-9860

Affiliations:
  • University of Twente, Enschede, The Netherlands


According to our database1, Marianne Junger authored at least 22 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Deception in double extortion ransomware attacks: An analysis of profitability and credibility.
Comput. Secur., March, 2024

2023
The development of phishing during the COVID-19 pandemic: An analysis of over 1100 targeted domains.
Comput. Secur., May, 2023

Ransomware Economics: A Two-Step Approach To Model Ransom Paid.
Proceedings of the APWG Symposium on Electronic Crime Research, 2023

2022
Lost in privacy? Online privacy from a cybersecurity expert perspective.
Telematics Informatics, 2022

Ransomware: How attacker's effort, victim characteristics and context influence ransom requested, payment and financial loss.
Proceedings of the APWG Symposium on Electronic Crime Research, 2022

2021
Privacy Rating: A User-Centered Approach for Visualizing Data Handling Practices of Online Services.
IEEE Trans. Prof. Commun., 2021

2020
Why would we get attacked? An analysis of attacker's aims behind DDoS attacks.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020

How effective are social engineering interventions? A meta-analysis.
Inf. Comput. Secur., 2020

2019
Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources.
Telematics Informatics, 2019

Teaching Empirical Social-Science Research to Cybersecurity Students: The Case of \"Thinking Like a Thief\".
IEEE Secur. Priv., 2019

Cybersafety Threats - from Deception to Aggression (Dagstuhl Seminar 19302).
Dagstuhl Reports, 2019

Victim Routine Influences the Number of DDoS Attacks: Evidence from Dutch Educational Network.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

A Note on Analysing the Attacker Aims Behind DDoS Attacks.
Proceedings of the Intelligent Distributed Computing XIII, 2019

2018
Correlates of Mono- and Dual-Victims of Cybergrooming and Cyberbullying: Evidence from Four Countries.
Cyberpsychology Behav. Soc. Netw., 2018

2017
Spear phishing in organisations explained.
Inf. Comput. Secur., 2017

Priming and warnings are not effective to prevent social engineering attacks.
Comput. Hum. Behav., 2017

How Effective is Anti-Phishing Training for Children?
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

Towards the normalization of cybercrime victimization: A routine activities analysis of cybercrime in europe.
Proceedings of the 2017 International Conference On Cyber Situational Awareness, 2017

2016
Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention.
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016

2015
Regression Nodes: Extending Attack Trees with Data from Social Sciences.
Proceedings of the 2015 Workshop on Socio-Technical Aspects in Security and Trust, 2015

2013
Applying the Lost-Letter Technique to Assess IT Risk Behaviour.
Proceedings of the Third Workshop on Socio-Technical Aspects in Security and Trust, 2013

How "Digital" is Traditional Crime?
Proceedings of the 2013 European Intelligence and Security Informatics Conference, 2013


  Loading...