Explaining cybercrime victimization using a longitudinal population-based survey experiment. Are personal characteristics, online routine activities, and actual self …
MS Van't Hoff-de Goede, S Van de Weijer… - Journal of Crime and …, 2023 - Taylor & Francis
With the increasing prevalence of cybercrime victimization there is a growing need for
prevention. Previous studies have attempted to uncover risk factors associated with …
prevention. Previous studies have attempted to uncover risk factors associated with …
Social engineering and the disclosure of personal identifiable information: Examining the relationship and moderating factors using a population-based survey …
R van der Kleij, S van 't Hoff—De Goede… - Journal of …, 2023 - journals.sagepub.com
People tend to disclose personal identifiable information (PII) that could be used by
cybercriminals against them. Often, persuasion techniques are used by cybercriminals to …
cybercriminals against them. Often, persuasion techniques are used by cybercriminals to …
How safely do we behave online? An explanatory study into the cybersecurity behaviors of dutch citizens
R van der Kleij, S van't Hoff-De Goede… - … Conference on Applied …, 2021 - Springer
Abstract The Capability-Opportunity-Motivation-Behavior (COM-B) model states that
people's behavior can be explained by their capabilities, opportunity, motivation, and the …
people's behavior can be explained by their capabilities, opportunity, motivation, and the …
Moving from Risk Factors to Positive Online Behaviors: An integrated behavioral change approach
T Smith, ER Leukfeldt… - … International Handbook of …, 2023 - taylorfrancis.com
This chapter introduces a fresh perspective on the study of online deviance by shifting the
focus from risk factors to the promotion of protective behaviors. It proposes a person-centric …
focus from risk factors to the promotion of protective behaviors. It proposes a person-centric …
Why Do Organizations Fail to Practice Cyber Resilience?
R van der Kleij, T Hof - International Conference on Human-Computer …, 2024 - Springer
When organizations fall victim to cyber incidents, they are exposed to financial implications,
data losses, and potential damage to their reputation. However, the positive news is that …
data losses, and potential damage to their reputation. However, the positive news is that …
Sentry of the Cyberspace during Covid-19 Pandemic: Experiences of Philippine National Police Cyber Cops
JM Oville, D Sabijon, Y Sayson… - … Journal of Law and …, 2024 - al-kindipublisher.com
This study aimed to explore the life experiences of cyber cops as sentries in cyberspace
during the COVID-19 pandemic in RACU 7. Specifically, this sought to answer the following …
during the COVID-19 pandemic in RACU 7. Specifically, this sought to answer the following …
Online criminaliteit in criminologisch perspectief
MW Kranenbarg… - Tijdschrift voor …, 2023 - search.proquest.com
Online criminaliteit in criminologisch perspec- tief Page 1 Tijdschrift voor Criminologie 2023
(65) 4 doi: 10.5553/TvC/0165182X2023065004002 400 Marleen Weulen Kranenbarg & …
(65) 4 doi: 10.5553/TvC/0165182X2023065004002 400 Marleen Weulen Kranenbarg & …
Online criminaliteit in criminologisch perspectief: Recente ontwikkelingen in het onderzoek naar daders en slachtoffers van online criminaliteit.
MW Kranenbarg… - Tijdschrift voor …, 2023 - search.ebscohost.com
In de eerste TvC-kroniek over cybercrime uit 2017 werd vooral gesproken over wat er nog
niet bekend was in dit relatief nieuwe veld. Sindsdien hebben cybercriminelen niet …
niet bekend was in dit relatief nieuwe veld. Sindsdien hebben cybercriminelen niet …
Understanding the Human Dimension: The Role of Persuasion and Psychological Factors in Cyberattack Vulnerability
D Brinkhof - 2024 - essay.utwente.nl
Phishing represents a significant cybersecurity threat, exploiting human vulnerabilities
through deceptive emails. This study investigates how awareness of phishing and …
through deceptive emails. This study investigates how awareness of phishing and …
[PDF][PDF] An Exploratory study into the aetiology of cybercrime:: Comparing the utility of the Routine Activities Theory using a model-comparison approach
T Smith - Caribbean Journal of Multidisciplinary Studies, 2023 - researchgate.net
The study took a human-centric approach to exploring cybercrime by comparing the utility of
the Routine Activities Theory (RAT) between cyber-dependent (hacking and malware …
the Routine Activities Theory (RAT) between cyber-dependent (hacking and malware …