default search action
BibTeX records: Jan-Willem Bullee
@inproceedings{DBLP:conf/ease/SilvaMMBT24, author = {Andr{\'{e}} Palheiros Da Silva and Winnie Mbaka and Johann Mayer and Jan{-}Willem Bullee and Katja Tuma}, title = {Does trainer gender make a difference when delivering phishing training? {A} new experimental design to capture bias}, booktitle = {Proceedings of the 28th International Conference on Evaluation and Assessment in Software Engineering, {EASE} 2024, Salerno, Italy, June 18-21, 2024}, pages = {130--139}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3661167.3661232}, doi = {10.1145/3661167.3661232}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ease/SilvaMMBT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BulleeJ20, author = {Jan{-}Willem Bullee and Marianne Junger}, title = {How effective are social engineering interventions? {A} meta-analysis}, journal = {Inf. Comput. Secur.}, volume = {28}, number = {5}, pages = {801--830}, year = {2020}, url = {https://doi.org/10.1108/ICS-07-2019-0078}, doi = {10.1108/ICS-07-2019-0078}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BulleeJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/BulleeMJH17, author = {Jan{-}Willem Bullee and Lorena Montoya and Marianne Junger and Pieter H. Hartel}, title = {Spear phishing in organisations explained}, journal = {Inf. Comput. Secur.}, volume = {25}, number = {5}, pages = {593--613}, year = {2017}, url = {https://doi.org/10.1108/ICS-03-2017-0009}, doi = {10.1108/ICS-03-2017-0009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/BulleeMJH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgcrc/BulleeMJH16, author = {Jan{-}Willem Bullee and Lorena Montoya and Marianne Junger and Pieter H. Hartel}, editor = {Aditya Mathur and Abhik Roychoudhury}, title = {Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention}, booktitle = {Proceedings of the Singapore Cyber-Security Conference {(SG-CRC)} 2016 - Cyber-Security by Design, Singapore, January 14-15, 2016}, series = {Cryptology and Information Security Series}, volume = {14}, pages = {107--114}, publisher = {{IOS} Press}, year = {2016}, url = {https://doi.org/10.3233/978-1-61499-617-0-107}, doi = {10.3233/978-1-61499-617-0-107}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sgcrc/BulleeMJH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/er/IonitaWBV15, author = {Dan Ionita and Roel J. Wieringa and Jan{-}Willem Bullee and Alexandr Vasenev}, editor = {Paul Johannesson and Mong{-}Li Lee and Stephen W. Liddle and Andreas L. Opdahl and Oscar Pastor L{\'{o}}pez}, title = {Tangible Modelling to Elicit Domain Knowledge: An Experiment and Focus Group}, booktitle = {Conceptual Modeling - 34th International Conference, {ER} 2015, Stockholm, Sweden, October 19-22, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9381}, pages = {558--565}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25264-3\_42}, doi = {10.1007/978-3-319-25264-3\_42}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/er/IonitaWBV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stast/BulleeMPJH15, author = {Jan{-}Willem Bullee and Lorena Montoya and Wolter Pieters and Marianne Junger and Pieter H. Hartel}, editor = {Giampaolo Bella and Gabriele Lenzini}, title = {Regression Nodes: Extending Attack Trees with Data from Social Sciences}, booktitle = {2015 Workshop on Socio-Technical Aspects in Security and Trust, {STAST} 2015, Verona, Italy, July 13, 2015}, pages = {17--23}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/STAST.2015.11}, doi = {10.1109/STAST.2015.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stast/BulleeMPJH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/IonitaBW14, author = {Dan Ionita and Jan{-}Willem Bullee and Roel J. Wieringa}, editor = {Kristian Beckers and Shamal Faily and Seok{-}Won Lee and Nancy R. Mead}, title = {Argumentation-based security requirements elicitation: The next round}, booktitle = {{IEEE} 1st Workshop on Evolving Security and Privacy Requirements Engineering, {ESPRE} 2014, 25 August, 2014, Karlskrona, Sweden}, pages = {7--12}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ESPRE.2014.6890521}, doi = {10.1109/ESPRE.2014.6890521}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/IonitaBW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.