An alternative intervention for juvenile hackers? A qualitative evaluation of the Hack_Right intervention
Jim Schiks (Lid Lectoraat); Susanne van 't Hoff-de Goede (Lid Lectoraat); E.R. (Rutger) Leukfeldt (Lector)
High tech crime, high intellectual crime?
E.R. (Rutger) Leukfeldt (Lector); Jim Schiks (Lid Lectoraat); Steve van de Weijer (Onderzoeker)
Financially motivated cybercriminal networks
E.R. (Rutger) Leukfeldt (Lector)
Balance
Graaf, J.W. (Jan Willem) de (Lector)
A study of preventing email (spear) phishing by enabling human intelligence
N. Stembert (Onderzoeker); A. Padmos (Onderzoeker); M.S. Bargh (Lector); R. Choenni (Lector); F. Jansen
Exploring a warrior paradigm to design out cybercrime
M.S. Bargh (Lector); R. Choenni (Lector); I.J. Mulder (Lector); Roland Pastoor (Onderzoeker)
From a European Union perspective, what were and what are the challenges of accession for Croatia, and what were the lessons learnt?
R. Kleiweg de Zwaan (Begeleider); Charlotte M.C. Richert (Student)
Awor nan ta yama nos criminal! (and now they can call us criminals!)
Rothfusz, Jacquelien
Mars chuckles and Athena sighs in frustration
R. Szafranski