• darkblurbg
  • darkblurbg
  • darkblurbg
  • darkblurbg
  • darkblurbg

Het Cyber Science Center doet wetenschappelijk onderzoek met aandacht voor bruikbare resultaten. Het onderzoeksprogramma voor 2016-2020 heet “Safety, Security and Law Enforcement in a Digital Society”. 

Hieronder zijn de onderzoeksproducten vanaf 2012 weergegeven (meest recent bovenaan):

2018

Schaik, P. van, Jansen, J., Onibokun, J., Camp, J. & Kusev, P. (2018). Security and privacy in online social networking: Risk perceptions and precautionary behaviour. Computers in Human Behavior, 78, 283-297.

2017

Kiljan, S.Z. (2017), Exploring, Explanding and Evaluating Usable Security in Online Banking (proefschrift). Heerlen: Open Universiteit.

Schaik, P. van, Jeske, D., Onibokun, J., Coventry, L., Jansen, J. & Kusev, P. (2017). Risk perceptions of cyber-security and precautionary behavior. Computers in Human Behavior, 75, 547-559.

Jansen, J & Schaik, P. van (2017). Comparing three models to explain precautionary online behavioural intentions. Information & Computer Security, 25(2), 165-180.

Jansen, F., Koops, B.-J., Lenthe, J. van, Maas, E., Planken, E., Schermer, B., Stol, W. & Verhoeven, M. (2017). Tackling cybercrime. In R. Leukfeldt (ed.), Research agenda: The human factor in cybercrime and cybersecurity.  The Hague: Eleven International Publishing.

Jansen, J., Junger, M., Kort, J., Leukfeldt, R., Veenstra, S., Wilsem, J. van & Zee, S. van der (2017). Victims. In R. Leukfeldt (ed.), Research agenda: The human factor in cybercrime and cybersecurity.  The Hague: Eleven International Publishing.

Jansen, J., Kop, N. & Stol, W. (2017). Internetbankieren: Veiligheidspercepties van gebruikers. Tijdschrift voor Veiligheid, 16(1), 36-51.

Borwell, J. (2017). Wie wordt de digitale beurs gelicht? De persoonlijkheids- en demografische kenmerken van e-fraudeslachtoffers vergeleken (Bachelor's thesis Politiekundige Bachelor). Politieacademie, Apeldoorn.


2016

Leukfeldt, E.R, Kleemans, E. & Stol, W. (2016). Offline sociale banden belangrijk voor cybercriminelen. Secondant: Platform voor Maatschappelijk Veiligheid.

Boes, S., & Leukfeldt, E.R. (2016). Fighting Cybercrime: A Joint Effort. In R.M. Clark & S. Hakim (Eds.), Cyber-Physical Security: Protecting Critical Infrastructure at the State and Local Level (pp. 185–203). Cham: Springer International Publishing.

Jansen, J., Veenstra, S., Zuurveen, R., & Stol, W. (2016). Guarding against online threats: why entrepreneurs take protective measures. Behaviour & Information Technology, 35(5), 368-379.

Jansen, J., & van Schaik, P. (2016, July). Understanding Precautionary Online Behavioural Intentions: A Comparison of Three Models. In Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance (HAISA).  

Jansen, J., & Leukfeldt, E.R. (2016). Phishing and Malware Attacks on Online Banking Customers in the Netherlands: A Qualitative Analysis of Factors Leading to Victimization. International Journal of Cyber Criminology, 10(1), 79-91. 

Kerstens, J., & Jansen, J. (2016). The Victim–Perpetrator Overlap in Financial Cybercrime: Evidence and Reflection on the Overlap of Youth’s On-Line Victimization and Perpetration. Deviant Behavior, 37(5), 585-600.

Kiljan, S., Vranken, H., & van Eekelen, M. (2016). Evaluation of transaction authentication methods for online banking. Future Generation Computer Systems.

Leukfeldt, E.R. (2016). Cybercriminal networks: Origin, growth and criminal capabilities (proefschrift). Den Haag: Eleven International Publishing. 

Leukfeldt, E.R., & Yar, M. (2016). Applying routine activity theory to cybercrime: A theoretical and empirical analysis. Deviant Behavior, 37(3), 263-280.

Leukfeldt, E.R., Kleemans, E.R., & Stol, W.P. (2016). Cybercriminal Networks, Social Ties and Online Forums: Social Ties Versus Digital Ties within Phishing and Malware Networks. British Journal of Criminology, azw009.

Veenstra, S., Zuurveen, R., & Stol, W. (2016). Cybercrime among Companies. Den Haag: Eleven International Publishing.

Veenstra, S., Zuurveen, R., Kerstens, J. & Stol, W.Ph. (2016). Opsporing in een gedigitaliseerde samenleving: Een handreiking voor het herkennen, vinden en benutten van digitale sporen. Leeuwarden: Lectoraat Cybersafety.

Kiljan, S., Vranken, H., & Eekelen, M. van (2016). Evaluation of transaction authentication methods for online banking. Future Generation Computer Systems. 

Pijpker, J. & Vranken, H. (2016). The Role of Internet Service Providers in Botnet Mitigation. In Proceedings of the European Intelligence and Security Informatics Conference (Uppsala, Sweden, August 17-19, 2016). EISIC 2016. 

Kiljan, S., Eekelen, M. van & Vranken, H. (2016). Towards A Virtual Bank For Evaluating Security Aspects With Focus On User Behavior. In Proceedings of 2016 SAI Computing Conference (London, UK, July 13-15, 2016). IEEE, 1068-1075. 


2015

Kerstens, J. (2015). Youth and cybersafety: Youth being at risk and being a risk on the internet (proefschrift). Leeuwarden: Lectoraat Cybersafety.

Jansen, J. (2015). Studying Safe Online Banking Behaviour: A Protection Motivation Theory Approach. In Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance (HAISA).  

Jansen, J., & Leukfeldt, R. (2015, July). How people help fraudsters steal their money: an analysis of 600 online banking fraud cases. In Socio-Technical Aspects in Security and Trust (STAST).

Leukfeldt, R., & Jansen, J. (2015). Cyber Criminal Networks and Money Mules: An Analysis of Low-Tech and High-Tech Fraud Attacks in the Netherlands. International Journal of Cyber Criminology, 9(2), 173-184.

Leukfeldt, E. R. (2015). Organised Cybercrime and Social Opportunity Structures. A Proposal for Future Research Directions. European Review of Organised Crime, 2, 91-103. 

Veenstra, S., Zuurveen, R. & Stol, W. (2015). Cybercrime onder bedrijven: Een onderzoek naar slachtofferschap van cybercrime onder het Midden- en Kleinbedrijf en Zelfstandigen Zonder Personeel in Nederland. Leeuwarden: Lectoraat Cybersafety.

Zuurveen, R., Doodeman, M., Veenstra, S. & Stol, W.Ph. (2015). Herkennen en veiligstellen van digitale apparatuur. Leeuwarden: Lectoraat Cybersafety.

2014

Kiljan, S., Vranken, H., & Van Eekelen, M. (2014, July). What You Enter Is What You Sign: input integrity in an online banking environment. In 2014 Workshop on Socio-Technical Aspects in Security and Trust.

Leukfeldt, E. R., Jansen, J., & Stol, W. P. (2014). Child pornography, the Internet and juvenile suspects. Journal of Social Welfare and Family Law,36(1), 3-13.

Haag, J., Witte, Ch., Karsch, S., Vranken, H., & Eekelen, M. van (2014). Evaluation of students’ learning behaviour and success as a prerequisite for modernizing practical on campus networking courses in higher education. Journal of Higher Education (Yüksekögretim Dergisi) 4(2), 83-90. 

Haag, J., Witte, Ch., Karsch, S., Vranken, H., & Eekelen, M. van (2014). An exercise assistant for practical networking courses. In Proceedings of the 6th International Conference On Computer Supported Education, Vol. 1 (Barcelona, Spain, April 1-3, 2014). CSEDU-2014. SCITEPRESS Science and Technology Publications, 97-104. 

Kiljan, S., Koen, S., Cock, D. de, Eekelen, M. van, & Vranken, H. (2014). Security of Online Banking Systems. Technical Report TR-OU-INF-2014-01, Open Universiteit. 

Kiljan, S., Vranken, H., & Eekelen, M. van (2014). What You Enter Is What You Sign: input integrity in an online banking environment. In Proceedings of the 4th Workshop on Socio-Technical Aspects in Security and Trust (Vienna, Austria, July 18, 2014). STAST-2014. IEEE, 40-47. 

2013

Domenie, M. M. L., Leukfeldt, E. R., van Wilsem, J. A., Jansen, J., & Stol, W. P. (2013). Slachtofferschap in een gedigitaliseerde samenleving. Den Haag: Boom Lemma uitgevers.

Jansen, J., Leukfeldt, R., Wilsem, J. van, & Stol, W. (2013). Onlinegedragingen: een risico voor hacken en persoonsgerichte cyberdelicten? Tijdschrift voor Criminologie, 55(4), 394-408. 

Stol, W.P., & Jansen, J. (Eds.) (2013). Cybercrime and the police. Den Haag: Eleven International Publishing.

Haag, J., Witte, Ch., Karsch, S., Vranken, H., & Eekelen, M. van (2013). Evaluation of students’ learning behaviour and success in a practical computer networking course. In Proceedings of the 2nd International Conference on E-Learning and E-Technologies in Education (Lodz, Poland, September 23 - 25, 2013). ICEEE 2013. 201-206

Schless, T. & Vranken, H. (2013). Counter Botnet Activities in the Netherlands: A Study on Organisation and Effectiveness. In Proceedings of the 8th International Conference for Internet Technology and Secured Transactions (London, UK, December 9 - 12, 2013). ICITST-2013. Infonomics Society, 442-447. 

2012

Kerstens, J., & Stol, W. (2012). Jeugd en Cybersafety: Online slachtoffer-en daderschap onder Nederlandse jongeren. Den Haag: Boom Lemma uitgevers.

Leukfeldt, R., & Stol, W.P. (2012). Cybersafety: An introduction. Den Haag: Boom Lemma uitgevers.

Leukfeldt, E.R., Veenstra, S., Domenie, M.M.L., & Stol, W.P. (2012). De strafrechtketen in een gedigitaliseerde samenleving. Een onderzoek naar de strafrechtelijke afhandeling van cybercrime. Leeuwarden: Lectoraat Cybersafety.

Haag, J., Karsch, S., Vranken, H., & Eekelen, M. van (2012). A Virtual Computer Security Lab As Learning Environment For Networking and Security Courses. In Proceedings of the 3rd Annual International Conference on Computer Science Education: Innovation and Technology (Singapore, November 19 - 20, 2012). CSEIT 2012. Global Science & Technology Forum, 61-68.