Repeat victimization by website defacement
E.R. (Rutger) Leukfeldt (Lector); Asier Moneva (Lid Lectoraat); Steve van de Weijer (Onderzoeker); Fernando Miró-Llinares (Onderzoeker)
Understanding human aspects for an effective information security management implementation.
Kör, Burcu (Amsib (Cedis)); Metin, Bilgin
Simulating Small-Scale Agricultural Adaptation Decisions in Response to Drought Risk: An Empirical Agent-Based Model for Semi-Arid Kenya
Wens, Marthe; Veldkamp, Ted I. (Lectoraat Klimaatbestendige Stad); Mwangi, Moses; Johnson, J. Michael; Lasage, Ralph; Haer, Toon; Aerts, Jeroen C. J. H.
Ons cybergedrag is veel onveiliger dan we zelf denken
Rick van der Kleij (Lid Lectoraat); Susanne van ‘t Hoff – de Goede, PhD (Lid Lectoraat); Steve van de Weijer (Onderzoeker)
Games for the optimal deployment of Security Forces
Corine Maartje Laan
Gender-sensitive Violence Risk Assessment
Vivienne de Vogel (Lector); Mieke Bruggeman; Marike Lancel
Determinants of reporting cybercrime
Steve van de Weijer; E.R. (Rutger) Leukfeldt (Lector); Wim Bernasco
End-users Compliance to the Information Security Policy
Peter Straver (Onderzoeker); Pascal Ravesteijn (Lector)
Promote end-users compliance to the Information Security Policy
Peter Straver (Student); Bas van Gils (Begeleider)






























