High tech crime, high intellectual crime?
E.R. (Rutger) Leukfeldt (Lector); Jim Schiks (Lid Lectoraat); Steve van de Weijer (Onderzoeker)
Repeat victimization by website defacement
E.R. (Rutger) Leukfeldt (Lector); Asier Moneva (Lid Lectoraat); Steve van de Weijer (Onderzoeker); Fernando Miró-Llinares (Onderzoeker)
Understanding human aspects for an effective information security management implementation.
Kör, Burcu (Amsib (Cedis)); Metin, Bilgin
Simulating Small-Scale Agricultural Adaptation Decisions in Response to Drought Risk: An Empirical Agent-Based Model for Semi-Arid Kenya
Wens, Marthe; Veldkamp, Ted I. (Lectoraat Water In En Om De Stad); Mwangi, Moses; Johnson, J. Michael; Lasage, Ralph; Haer, Toon; Aerts, Jeroen C. J. H.
Criminal persuasion techniques versus sharing personal information
Susanne van ‘t Hoff – de Goede, PhD (Lid Lectoraat)
The price of human rights
Isaura Cardoso (Student); M. van Munster (Begeleider)
New Technologies and Deterrence
Alex Wilner; Casey Babb
Ons cybergedrag is veel onveiliger dan we zelf denken
Rick van der Kleij (Lid Lectoraat); Susanne van ‘t Hoff – de Goede, PhD (Lid Lectoraat); Steve van de Weijer (Onderzoeker)
Why has the implementation of UNSCR 1325(2000) on taking a stand for Women, Peace, and Security by the Netherlands and Italy failed to provide the desired results?
Manon Wiersema (Student); M. (Mihaela) Anghel (Begeleider)