BibTeX records: Jan-Willem Bullee

download as .bib file

@inproceedings{DBLP:conf/ease/SilvaMMBT24,
  author       = {Andr{\'{e}} Palheiros Da Silva and
                  Winnie Mbaka and
                  Johann Mayer and
                  Jan{-}Willem Bullee and
                  Katja Tuma},
  title        = {Does trainer gender make a difference when delivering phishing training?
                  {A} new experimental design to capture bias},
  booktitle    = {Proceedings of the 28th International Conference on Evaluation and
                  Assessment in Software Engineering, {EASE} 2024, Salerno, Italy, June
                  18-21, 2024},
  pages        = {130--139},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3661167.3661232},
  doi          = {10.1145/3661167.3661232},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ease/SilvaMMBT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BulleeJ20,
  author       = {Jan{-}Willem Bullee and
                  Marianne Junger},
  title        = {How effective are social engineering interventions? {A} meta-analysis},
  journal      = {Inf. Comput. Secur.},
  volume       = {28},
  number       = {5},
  pages        = {801--830},
  year         = {2020},
  url          = {https://doi.org/10.1108/ICS-07-2019-0078},
  doi          = {10.1108/ICS-07-2019-0078},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BulleeJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/BulleeMJH17,
  author       = {Jan{-}Willem Bullee and
                  Lorena Montoya and
                  Marianne Junger and
                  Pieter H. Hartel},
  title        = {Spear phishing in organisations explained},
  journal      = {Inf. Comput. Secur.},
  volume       = {25},
  number       = {5},
  pages        = {593--613},
  year         = {2017},
  url          = {https://doi.org/10.1108/ICS-03-2017-0009},
  doi          = {10.1108/ICS-03-2017-0009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/BulleeMJH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgcrc/BulleeMJH16,
  author       = {Jan{-}Willem Bullee and
                  Lorena Montoya and
                  Marianne Junger and
                  Pieter H. Hartel},
  editor       = {Aditya Mathur and
                  Abhik Roychoudhury},
  title        = {Telephone-based social engineering attacks: An experiment testing
                  the success and time decay of an intervention},
  booktitle    = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)}
                  2016 - Cyber-Security by Design, Singapore, January 14-15, 2016},
  series       = {Cryptology and Information Security Series},
  volume       = {14},
  pages        = {107--114},
  publisher    = {{IOS} Press},
  year         = {2016},
  url          = {https://doi.org/10.3233/978-1-61499-617-0-107},
  doi          = {10.3233/978-1-61499-617-0-107},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sgcrc/BulleeMJH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/er/IonitaWBV15,
  author       = {Dan Ionita and
                  Roel J. Wieringa and
                  Jan{-}Willem Bullee and
                  Alexandr Vasenev},
  editor       = {Paul Johannesson and
                  Mong{-}Li Lee and
                  Stephen W. Liddle and
                  Andreas L. Opdahl and
                  Oscar Pastor L{\'{o}}pez},
  title        = {Tangible Modelling to Elicit Domain Knowledge: An Experiment and Focus
                  Group},
  booktitle    = {Conceptual Modeling - 34th International Conference, {ER} 2015, Stockholm,
                  Sweden, October 19-22, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9381},
  pages        = {558--565},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25264-3\_42},
  doi          = {10.1007/978-3-319-25264-3\_42},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/er/IonitaWBV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stast/BulleeMPJH15,
  author       = {Jan{-}Willem Bullee and
                  Lorena Montoya and
                  Wolter Pieters and
                  Marianne Junger and
                  Pieter H. Hartel},
  editor       = {Giampaolo Bella and
                  Gabriele Lenzini},
  title        = {Regression Nodes: Extending Attack Trees with Data from Social Sciences},
  booktitle    = {2015 Workshop on Socio-Technical Aspects in Security and Trust, {STAST}
                  2015, Verona, Italy, July 13, 2015},
  pages        = {17--23},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/STAST.2015.11},
  doi          = {10.1109/STAST.2015.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stast/BulleeMPJH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/IonitaBW14,
  author       = {Dan Ionita and
                  Jan{-}Willem Bullee and
                  Roel J. Wieringa},
  editor       = {Kristian Beckers and
                  Shamal Faily and
                  Seok{-}Won Lee and
                  Nancy R. Mead},
  title        = {Argumentation-based security requirements elicitation: The next round},
  booktitle    = {{IEEE} 1st Workshop on Evolving Security and Privacy Requirements
                  Engineering, {ESPRE} 2014, 25 August, 2014, Karlskrona, Sweden},
  pages        = {7--12},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ESPRE.2014.6890521},
  doi          = {10.1109/ESPRE.2014.6890521},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/IonitaBW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}