W. Pieters
Please Note
39 records found
1
Bayesian network model to distinguish between intentional attacks and accidental technical failures
A case study of floodgates
Individual preferences in security risk decision making
An exploratory study under security professionals
Risk Personalization
Governing Uncertain Collective Risk Through Individual Decisions
Everything-as-a-hack
Claims-making for access to digital and social resources
On the anatomy of social engineering attacks
A literature-based dissection of successful attacks
The hybrid victim
Re-conceptualizing high-tech cyber victimization through actor-network theory
Plots, murders, and money
Oversight bodies evaluating the effectiveness of surveillance technology
The effectiveness of surveillance technology
What intelligence officials are saying