EEMCS

Home > Publications
Home University of Twente
Education
Research
Prospective Students
Jobs
Publications
Intranet (internal)
 
 Nederlands
 Contact
 Search
 Organisation

EEMCS EPrints Service


Author: Pieters, W.
Home Policy Brochure Browse Search User Area Contact Help

2017

Pieters, W. and Dechesne, F. (2017) Adversarial risks in social experiments with new technologies. In: Experimentation beyond the laboratory: new perspectives on technology. Routledge, Oxford, UK. ISBN 9781138204010

2016

Chockalingam, S. and Hadžiosmanović, D. and Pieters, W. and Texeira, A. and van Gelder, P. (2016) Integrated Safety and Security Risk Assessment Methods: A Survey of Key Characteristics and Applications. In: 11th International Conference on Critical Information Infrastructures Security (CRITIS), October 10–12, 2016, Paris, France. Lecture Notes in Computer Science. Springer.
Fichtner, L. and Pieters, W. and Texeira, A. (2016) Cybersecurity as a Politikum: Implications of Security Discourses for Infrastructures. In: New Security Paradigms Workshop (NSPW), September 26-29, 2016, Colorado, USA. ACM.
Pieters, W. and Barendse, J. and Ford, M. and Heath, C.P.R. and Probst, C.W. and Verbij, R. (2016) The Navigation Metaphor in Security Economics. IEEE Security & Privacy, 14 (3). pp. 14-21. ISSN 1540-7993 *** ISI Impact 0,902 ***
Pieters, W. and Hadžiosmanović, D. and Dechesne, F. (2016) Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace. Science and Engineering Ethics, 22 (3). pp. 831-850. ISSN 1353-3452 *** ISI Impact 1,454 ***
Probst, C.W. and Willemson, J. and Pieters, W. (2016) The Attack Navigator (Invited). In: Graphical Models for Security - Revised Selected Papers. Lecture Notes in Computer Science 9390. Springer Verlag, Berlin, pp. 1-17. ISSN 0302-9743 ISBN 978-3-319-29967-9
van Wieren, M. and Doerr, C. and Jacobs, V. and Pieters, W. (2016) Understanding Bifurcation of Slow Versus Fast Cyber-Attackers. In: 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, 26-27 September 2016, Heraklion, Greece. pp. 19-33. Lecture Notes in Computer Science 9963. Springer Verlag. ISSN 0302-9743 ISBN 978-3-319-47071-9

2015

Bullee, J.H. and Montoya Morales, A.L. and Pieters, W. and Junger, M. and Hartel, P.H. (2015) The persuasion and security awareness experiment: reducing the success of social engineering attacks. Journal of Experimental Criminology, 11 (1). pp. 97-115. ISSN 1573-3750 *** ISI Impact 2,229 ***
Bullee, J.H. and Montoya Morales, A.L. and Pieters, W. and Junger, M. and Hartel, P.H. (2015) Regression Nodes: Extending attack trees with data from social sciences. In: Proceedings of the Workshop on Socio-Technical Aspects in Security and Trust (STAST 2015), 13 Jul 2015, Verona, Italy. pp. 17-23. IEEE Computer Society. ISBN 978-1-5090-0178-1
Gollmann, D. and Herley, C. and Koenig, V. and Pieters, W. and Sasse, M. A. (2015) Socio-Technical Security Metrics (Dagstuhl Seminar 14491). Dagstuhl Reports, 4 (12). pp. 1-28. ISSN 2192-5283
Herley, C. and Pieters, W. (2015) “If you were attacked, you’d be sorry”: Counterfactuals as security arguments. In: New Security Paradigm Workshop (NSPW), 8-11 Sept 2015, Twente, Netherlands. pp. 112-123. ACM. ISBN 978-1-4503-3754-0
Ionita, D. and Wieringa, R.J. and Wolos, L. and Gordijn, J. and Pieters, W. (2015) Using Value Models for Business Risk Analysis in e-Service Networks. In: 8th IFIP WG 8.1. Working Conference on the Practice of Enterprise Modelling, PoEM 2015, 10-12 Nov 2015, Valencia, Spain. pp. 239-253. Lecture Notes in Business Information Processing 235. Springer Verlag. ISSN 1865-1348 ISBN 978-3-319-25896-6
Pieters, W. and Davarynejad, M. (2015) Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers. In: 9th International Workshop on Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance (DPM), 10-11 Sep 2014, Wroclaw, Poland. pp. 201-215. Lecture Notes in Computer Science 8872 . Springer. ISSN 0302-9743 ISBN 978-3-319-17015-2
Pieters, W. and Padget, J. and Dechesne, F. and Dignum, V. and Aldewereld, H. (2015) Effectiveness of qualitative and quantitative security obligations. Journal of Information Security and Applications, 22. pp. 3-16. ISSN 2214-2126
van der Wagen, W. and Pieters, W. (2015) From Cybercrime to Cyborg Crime: Botnets as Hybrid Criminal Actor-Networks. British journal of Criminology, 55 (2). pp. 1-18. ISSN 0007-0955 *** ISI Impact 1,643 ***

2014

Arnold, F. and Pieters, W. and Stoelinga, M.I.A. (2014) Quantitative Penetration Testing with Item Response Theory. Journal of Information Assurance and Security, 9 (3). pp. 118-127. ISSN 1554-1010
Dechesne, F. and Hadžiosmanović, D. and Pieters, W. (2014) Experimenting with Incentives: Security in Pilots for Future Grids. IEEE Security & Privacy, 12 (6). pp. 59-66. ISSN 1540-7993 *** ISI Impact 0,902 ***
Pieters, W. and Hadžiosmanović, D. and Dechesne, F. (2014) Cyber Security as Social Experiment. In: NSPW '14 Proceedings of the 2014 workshop on New Security Paradigms, NSPW 2014, 15-18 Sep. 2014, Victoria, BC, Canada. pp. 15-24. ACM. ISBN 978-1-4503-3062-6
Pieters, W. and Hadžiosmanović, D. and Lenin, A. and Montoya Morales, A.L. and Willemson, J. (2014) TREsPASS: Plug-and-Play Attacker Profiles for Security Risk Analysis (Poster). In: 35th IEEE Symposium on Security and Privacy, May 17-18, 2014, San Jose, California. IEEE Computer Society. ISBN not assigned
Pieters, W. and Lukszo, Z. and Hadžiosmanović, D. and van den Berg, Jan (2014) Reconciling Malicious and Accidental Risk in Cyber Security. Journal of Internet Services and Information Security, 4 (2). pp. 4-26. ISSN 2182-2069
Pieters, W. and Probst, C.W. and Lukszo, S. and Montoya Morales, A.L. (2014) Cost-effectiveness of Security Measures: A model-based Framework. In: Approaches and Processes for Managing the Economics of Information Systems. IGI Global, Hershey, PA, pp. 139-156. ISBN 978-1-4666-4983-5

2013

Arnold, F. and Pieters, W. and Stoelinga, M.I.A. (2013) Quantitative penetration testing with item response theory (extended version). Technical Report TR-CTIT-13-20, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Arnold, F. and Pieters, W. and Stoelinga, M.I.A. (2013) Quantitative penetration testing with item response theory. In: 9th International Conference on Information Assurance and Security, IAS 2013, 4-6 Dec 2013, Gammarth, Tunisia. pp. 49-54. IEEE. ISBN 978-1-4799-2989-4
Bleikertz, S. and Mastelic, T. and Pape, S. and Pieters, W. and Dimkov, T. (2013) Defining the cloud battlefield - supporting security assessments by cloud customers. In: International Conference on Cloud Engineering (IC2E 2013), 25-27 Mar 2013 , Redwood City, CA . pp. 78-87. IEEE Computer Society. ISBN 978-1-4673-6473-7
Ionita, D. and Hartel, P.H. and Pieters, W. and Wieringa, R.J. (2013) Current established risk assessment methodologies and tools. Technical Report TR-CTIT-14-04, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Pieters, W. (2013) On thinging things and serving services: technological mediation and inseparable goods. Ethics and information technology, 15 (3). pp. 195-208. ISSN 1388-1957 *** ISI Impact 0,739 ***
Pieters, W. (2013) Defining "The Weakest Link" Comparative Security in Complex Systems of Systems. In: 2013 IEEE 5th International Conference on Cloud Computing Technology and Science, CloudCom, 2-5 Dec 2013, Bristol, United Kingdom. pp. 39-44. IEEE Computer Society. ISBN 978-0-7695-5095-4
Pieters, W. and Dimkov, T. and Pavlovic, D. (2013) Security Policy Alignment: A Formal Approach. IEEE Systems Journal, 7 (2). pp. 275-287. ISSN 1932-8184 *** ISI Impact 2,114 ***
Pieters, W. and Padget, J. and Dechesne, F. and Dignum, V. and Aldewereld, H. (2013) Obligations to enforce prohibitions: on the adequacy of security policies. In: SIN '13 - Proceedings of the 6th International Conference on Security of Information and Networks, 26-28 Nov 2013, Aksaray, Turkey. pp. 54-61. Proceeding. ACM. ISBN 978-1-4503-2498-4
Stoelinga, M.I.A. and Pieters, W. (2013) Attack navigator vindt en verhelpt zwakke plekken. Bits en chips, 4. ISSN 1879-6443

2012

Kulikova, O. and Heil, R. and van den Berg, Jan and Pieters, W. (2012) Cyber crisis management: a decision-support framework for disclosing security incident information. In: International Conference on Cyber Security, CyberSecurity 2012, 14-16 Dec 2012, Washington, USA. pp. 103-112. Cyber Security (CyberSecurity), 2012 International Conference . IEEE Computer Society. ISBN 978-1-4799-0219-4
Pieters, W. and van der Ven, S. and Probst, C.W. (2012) A Move in the Security Measurement Stalemate: Elo-Style Ratings to Quantify Vulnerability. In: Proceedings of the 2012 workshop on New security paradigms (NSPW 2012), 18-21 Sep 2012, Bertinoro, Italy. pp. 1-14. ACM. ISBN 978-1-4503-1794-8
Probst, C.W. and Sasse, A.M. and Pieters, W. and Dimkov, T. and Luysterborg, E. and Arnaud, M. (2012) Privacy penetration testing -- how to establish trust in your cloud provider. In: European Data Protection: In Good Health? International, Foreign and Comparative Law XVIII. Springer, London, pp. 251-266. ISBN 978-94-007-2902-5

2011

Alberts, G. and Boersma, K. and Broekhans, B. and Dijkstra, Anne and Pieters, W. and Popkema, M. and Vanheste, T. (2011) Inleiding: Kennisklimaat. In: Kennisklimaat: (On)macht van de wetenschap in het klimaatdebat. Jaarboek Kennissamenleving 7. Amsterdam University Press, Amsterdam, pp. 7-11. ISSN 1871-0034 ISBN 978-90-8964-401-5
van Cleeff, A. and Dimkov, T. and Pieters, W. and Wieringa, R.J. (2011) Realizing Security Requirements with Physical Properties: A Case Study on Paper Voting. In: Proceedings of the International Conference on IT Convergence and Security (ICITCS 2011), 14-16 Dec, 2011, Suwon, South Korea. pp. 51-67. Lecture Notes in Electrical Engineering 120. Springer Verlag. ISSN 1876-1100 ISBN 978-94-007-2910-0
van Cleeff, A. and Pieters, W. and Wieringa, R.J. and van Tiel, F. (2011) Integrated assessment and mitigation of physical and digital security threats: Case studies on virtualization. Information Security Technical Report, 16 (3-4). pp. 142-149. ISSN 1363-4127
De Capitani di Vimercati, S. and Pieters, W. and Probst, C.W. (2011) Secure Architectures in the Cloud. Technical Report 11492 Dagstuhl, Germany. ISSN 2192-5283
Dimkov, T. and Pieters, W. (2011) Physical Penetration Testing: A Whole New Story in Penetration Testing. PenTest Magazine, 2011 (2). pp. 20-23. ISSN not assigned
Dimkov, T. and Pieters, W. and Hartel, P.H. (2011) Training Students to Steal: A Practical Assignment in Computer Security Education. In: Proceedings of the 42nd ACM Technical Symposium on Computer Science Education (SIGCSE 2011), 9-12 Mar 2011, Dallas, Texas, USA. pp. 21-26. ACM. ISBN 978-1-4503-0500-6
Pieters, W. (2011) Explanation and trust: what to tell the user in security and AI? Ethics and information technology, 13 (1). pp. 53-64. ISSN 1388-1957 *** ISI Impact 0,739 ***
Pieters, W. (2011) Cloud security in vogelvlucht. Informatiebeveiliging, 2011 (1). pp. 16-17. ISSN 1569-1063
Pieters, W. (2011) High security, human significance: Informatiebeveiliging in Twente. Informatiebeveiliging, 2011 (2). pp. 14-17. ISSN 1569-1063
Pieters, W. (2011) Representing humans in system security models: An actor-network approach. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2 (1). pp. 75-92. ISSN 2093-5374
Pieters, W. (2011) The (social) construction of information security. The Information Society, 27 (5). pp. 326-335. ISSN 0197-2243 *** ISI Impact 1,333 ***
Pieters, W. (2011) Risicopersonalisatie en haar falen in collectieve vraagstukken. In: Kennisklimaat: (On)macht van de wetenschap in het klimaatdebat. Jaarboek Kennissamenleving 7. Amsterdam University Press, Amsterdam, pp. 197-207. ISSN 1871-0034 ISBN 978-90-8964-401-5
Pieters, W. (2011) Security and privacy in the clouds: a bird's eye view. In: Computers, Privacy and Data Protection: an Element of Choice. Springer, Dordrecht, pp. 445-457. ISBN 978-94-007-0640-8
Pieters, W. (2011) How devices transform voting. In: Innovating Government. Normative, policy and technological dimensions of modern government. Information Technology and Law Series 20. T.M.C. Asser Press, The Hague, pp. 439-452. ISSN 1570-2782 ISBN 978-90-6704-730-2
Pieters, W. and Coles-Kemp, L. (2011) Reducing normative conflicts in information security. In: Proceedings of the 2011 New security paradigms workshop, NSPW '11, 12-15 Sep 2011, Marin County, CA. pp. 11-24. ACM. ISBN 978-1-4503-1078-9
Popkema, M. and Pieters, W. and Boersma, K. and Broekhans, B. (2011) Epiloog: Het klimaat voor kennis in de kennissamenleving. In: Kennisklimaat: (On)macht van de wetenschap in het klimaatdebat. Jaarboek Kennissamenleving 7. Amsterdam University Press, Amsterdam, pp. 225-231. ISSN 1871-0034 ISBN 978-90-8964-401-5

2010

van Cleeff, A. and Pieters, W. and Wieringa, R.J. (2010) ANWB-enquête niet democratisch. NRC handelsblad, 40 (25-01-2010). 6. ISSN 0002-5259
van Cleeff, A. and Pieters, W. and Wieringa, R.J. (2010) Gooi eigen servers en pc’s niet weg. Best Practice Magazine, 4 (1). pp. 8-10. ISSN 0891-060X
van Cleeff, A. and Pieters, W. and Wieringa, R.J. (2010) Zorg liever voor een overzichtelijk stembiljet. NRC handelsblad, 40 (07-06-2010). pp. 6-6. ISSN 0002-5259
van Cleeff, A. and Pieters, W. and Wieringa, R.J. (2010) Benefits of Location-Based Access Control:A Literature Study. In: Proceedings of the 3rd IEEE/ACM International Conference on Cyber, Physical and Social Computing (CPSCom 2010), 18-20 Dec, 2010, Hangzhou, China. pp. 739-746. IEEE Computer Society. ISBN 978-1-4244-9779-9
Dimkov, T. and van Cleeff, A. and Pieters, W. and Hartel, P.H. (2010) Two methodologies for physical penetration testing using social engineering. In: Proceedings of the Annual Computer Security Applications Conference (ACSAC), 06-10 Dec 2010, Austin, Texas, USA. pp. 399-408. ACM. ISBN 978-1-4503-0133-6
Dimkov, T. and Pieters, W. and Hartel, P.H. (2010) Portunes: representing attack scenarios spanning through the physical, digital and social domain. In: Proceedings of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (ARSPA-WITS'10). Revised Selected Papers, 27-28 March 2010, Paphos, Cyprus. pp. 112-129. Lecture Notes in Computer Science 6186. Springer Verlag. ISBN 978-3-642-16074-5
Dimkov, T. and Pieters, W. and Hartel, P.H. (2010) Laptop theft: a case study on effectiveness of security mechanisms in open organizations. Technical Report TR-CTIT-10-07, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dimkov, T. and Pieters, W. and Hartel, P.H. (2010) Portunes: analyzing multi-domain insider threats. Technical Report TR-CTIT-10-39, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dimkov, T. and Pieters, W. and Hartel, P.H. (2010) Laptop theft: a case study on effectiveness of security mechanisms in open organizations. In: Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS), 4-8 Oct 2010, Chicago, Illinois, US. pp. 666-668. ACM. ISBN 978-1-4503-0245-6
Dimkov, T. and Pieters, W. and Hartel, P.H. (2010) Effectiveness of physical, social and digital mechanisms against laptop theft in open organizations. In: Proceedings of the 3rd IEEE/ACM International Conference on Cyber, Physical and Social Computing (CPSCom 2010), 18-20 Dec 2010, Hangzhou, China. pp. 727-732. IEEE Computer Society. ISBN 978-1-4244-9779-9
Jonker, H.L. and Pieters, W. (2010) Anonymity in voting revisited. In: Towards Trustworthy Elections: New Directions in Electronic Voting. Lecture Notes in Computer Science 6000. Springer Verlag, Berlin, pp. 216-230. ISSN 0302-9743 ISBN 978-3-642-12979-7
Langer, L. and Jonker, H.L. and Pieters, W. (2010) Anonymity and Verifiability in Voting: Understanding (Un)Linkability. In: 12th International Conference Information and Communications Security, ICICS 2010, 15-17 Dec 2010, Barcelona, Spain. pp. 296-310. Lecture Notes in Computer Science 6476. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-17649-4
Pieters, W. (2010) ANKH: Information Threat Analysis with Actor-NetworK Hypergraphs. Technical Report TR-CTIT-10-16, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. (2010) Explanation and trust: what to tell the user in security and AI? Technical Report TR-CTIT-10-32, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. (2010) Security and privacy in the clouds: a bird's eye view. Technical Report TR-CTIT-10-31, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. (2010) Reve{a,i}ling the risks: a phenomenology of information security Techné: Research in Philosophy and Technology, 14 (3). pp. 176-188. ISSN 1091-8264
Pieters, W. (2010) Verifiability of electronic voting: between confidence and trust. In: Data Protection in a Profiled World. Springer, Dordrecht, pp. 157-175. ISBN 978-90-481-8864-2
Pieters, W. (2010) Informational precaution. In: 8th Conference on Computing and Philosophy (ECAP10), 4-6 Oct 2010, Munich, Germany. pp. 320-325. Verlag Dr. Hut. ISBN 978-3-86853-546-4
Pieters, W. and Boersma, K. and Alberts, G. and Timmer, J. and Dijkstra, Anne and Popkema, M. (2010) Inzicht en toezicht: controle in de kennissamenleving. In: Inzicht en toezicht: controle in de kennissamenleving. Jaarboek Kennissamenleving (6). Aksant, Amsterdam, pp. 7-17. ISSN 1871-0034 ISBN 978-90-5260-384-1

2009

van Cleeff, A. and Pieters, W. and Wieringa, R.J. (2009) Security Implications of Virtualization: A Literature Study. Technical Report TR-CTIT-09-25, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
van Cleeff, A. and Pieters, W. and Wieringa, R.J. (2009) Security Implications of Virtualization: A Literature Study. In: 2009 IEEE International Conference on Computational Science and Engineering (CSE09), volume 3, 29 Aug - 31 Aug, Vancouver, BC, Canada. pp. 353-358. IEEE Computer Society. ISBN 978-0-7695-3823-5
van Cleeff, A. and Pieters, W. and Wieringa, R.J. (2009) Gooi eigen servers en pc's niet weg. TIEM, Tijdschrift voor Informatie en Management, 34. pp. 8-9. ISSN 1572-5472
Dimkov, T. and Pieters, W. and Hartel, P.H. (2009) Portunes: generating attack scenarios by finding inconsistencies between security policies in the physical, digital and social domain. Technical Report TR-CTIT-09-15, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Dimkov, T. and Pieters, W. and Hartel, P.H. (2009) Two methodologies for physical penetration testing using social engineering. Technical Report TR-CTIT-09-48, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Jacobs, B.P.F. and Pieters, W. (2009) Electronic Voting in the Netherlands: From Early Adoption to Early Abolishment. In: Foundations of Security Analysis and Design V: FOSAD 2007/2008/2009 Tutorial Lectures. Lecture Notes in Computer Science 5705. Springer Verlag, Berlin, pp. 121-144. ISSN 0302-9743 ISBN 978-3-642-03828-0
Pieters, W. (2009) De monsterlijke trekjes van beveiligingsproblemen. Informatiebeveiliging, 2009 (3). pp. 23-25. ISSN 1569-1063
Pieters, W. (2009) Combatting electoral traces: the Dutch tempest discussion and beyond. Technical Report TR-CTIT-09-21, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. (2009) Converging technologies and de-perimeterisation: towards risky active insulation. In: Proceedings of SPT 2009: Converging technologies, changing societies, 7-10 Jul 2009, Enschede, The Netherlands. pp. 58-60. CEPTES, University of Twente. ISBN not assigned
Pieters, W. (2009) Reve{a,i}ling the risks: a phenomenology of information security Technical Report TR-CTIT-09-33, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. (2009) Combatting electoral traces: the Dutch tempest discussion and beyond. In: E-Voting and Identity: Second International Conference, VOTE-ID 2009, 7-8 Sep 2009, Luxembourg city, Luxembourg. pp. 172-190. Lecture Notes in Computer Science 5767. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-04134-1
Pieters, W. and van Cleeff, A. (2009) The Precautionary Principle in a World of Digital Dependencies. IEEE Computer, 42 (6). pp. 50-56. ISSN 0018-9162 *** ISI Impact 1,115 ***
Pieters, W. and van Cleeff, A. (2009) The precautionary principle in a world of digital dependencies. Technical Report TR-CTIT-09-23, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. and van Cleeff, A. and Wieringa, R.J. (2009) Voor goede keuzes heb je tijd nodig. Trouw, 67 (19855, 5 Aug 2009). 25. ISSN not assigned
Pieters, W. and Consoli, L. (2009) Vulnerabilities and responsibilities: dealing with monsters in computer security. Journal of information, communication and ethics in society, 7 (4). pp. 243-257. ISSN 1477-996X
Pieters, W. and Popkema, M. and Broekhans, B. and Dijkstra, Anne and Boersma, K. and Alberts, G. (2009) Gevoel voor kennis: emoties in de kennissamenleving. In: Gevoel voor kennis. Jaarboek Kennissamenleving 5. Aksant, Amsterdam, pp. 7-20. ISSN 1871-0034 ISBN 978-90-5260-351-3
Pieters, W. and Tang, Qiang (2009) Data is key: introducing the data-based access control paradigm. Technical Report TR-CTIT-09-22, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. and Tang, Qiang (2009) Data is key: introducing the data-based access control paradigm. In: Data and Applications Security 2009, 12-15 Jul 2009, Montreal, Canada. pp. 240-251. Lecture Notes in Computer Science 5645. Springer Verlag. ISBN 978-3-642-03006-2

2008

Pieters, W. (2008) Vertrouwen en werkelijkheid in de stemcomputercontroverse. In: Burger in Uitvoering. Jaarboek Kennissamenleving 4. Aksant, Amsterdam, pp. 17-25. ISBN 978-90-5260-307-0
Pieters, W. (2008) De monsterlijke trekjes van beveiligingsproblemen. Informatiebeveiliging, 2008 (3). pp. 18-20. ISSN 1569-1063
Pieters, W. (2008) Betrouwbaarheid of vertrouwbaarheid : Vertrouwen in technologie en bestuur. Openbaar bestuur, 18 (10). pp. 27-30. ISSN 0925-7322
Pieters, W. (2008) La volonté machinale: understanding the electronic voting controversy. PhD thesis, Radboud University Nijmegen. ISBN 978-90-9022554-8
Pieters, W. and Becker, M.J. (2008) Ethics of e-voting: an essay on requirements and values in Internet elections. In: E-Democracy: Concepts and Practices. Icfai University Press, pp. 134-157. ISBN 978-81-314-1914-4

2007

Koopman, P. and Hubbers, E.M.G.M. and Pieters, W. and Poll, E. and de Vries, R. (2007) Testing the eSTV program for the Scottish Local Government Elections. LaQuSo report not assigned, Radboud University Nijmegen, Nijmegen. ISSN not assigned
Pieters, W. and van Haren, R. (2007) Temptations of turnout and modernisation: e-voting discourses in the UK and the Netherlands. Journal of Information, Communication and Ethics in Society, 5 (4). pp. 276-292. ISSN 1477-996X
Pieters, W. and van Haren, R. (2007) E-voting discourses in the UK and the Netherlands. Technical Report ICIS-R07020, Radboud University Nijmegen, Nijmegen. ISSN 1571-5221
Pieters, W. and Jonker, H.L. (2007) Vote buying revisited: implications for receipt-freeness. In: Proceedings of the 2nd Benelux Workshop on Information and System Security (WISSec 2007), 20-21 Sep 2007, Luxembourg city, Luxembourg. University of Luxembourg. ISSN not assigned

2006

Jonker, H.L. and Pieters, W. (2006) Receipt-freeness as a special case of anonymity in epistemic logic. In: Proceedings of the IAVoSS Workshop On Trustworthy Elections (WOTE 2006), 29-30 Jun 2006, Cambridge, UK. Robinson College. ISBN not assigned
Pieters, W. (2006) Acceptance of voting technology: between confidence and trust. In: K. Stølen et al.(eds) iTrust 2006. pp. 283-297. Lecture Notes in Computer Science 3986. Springer. ISBN 978-3-540-34295-3
Pieters, W. (2006) What proof do we prefer? Variants of verifiability in voting. In: Workshop on Electronic Voting and e-Government in the UK, 27-28 Feb 2006, Edinburgh, UK. pp. 33-39. e-Science Institute. ISSN not assigned
Pieters, W. (2006) Internet voting: a monstrous alliance between democracy and technology? In: Fifth international conference on Cultural Attitudes towards Technology and Communication 2006, 28 Jun - 1 Jul 2006, Tartu, Estonia. pp. 115-129. School of Information Technology, Murdoch University. ISBN 0-86905-968-8
Pieters, W. (2006) Internet voting: a conceptual challenge to democracy. In: Social Inclusion: Societal and Organizational Implications for Information Systems: IFIP TC8 WG8.2 International Working Conference, 12-15 Jul 2006, Limerick, Ireland. pp. 89-103. IFIP International Federation for Information Processing 208/2006. Springer. ISSN 1571-5736 ISBN 978-0-387-34587-1
Pieters, W. and Consoli, L. (2006) Vulnerabilities as monsters: the cultural foundations of computer security (extended abstract). In: Proceedings of the European Computing and Philosophy Conference (E-CAP 2006), 22-24 Jun 2006, Trondheim, Norway. NTNU. ISBN not assigned

2005

Garcia, F.D. and Hasuo, I. and Pieters, W. and van Rossum, P.J.B. (2005) Provable anonymity. In: Proceedings of the 2005 ACM workshop on Formal methods in security engineering, Fairfax, VA, USA. pp. 63-72. ACM. ISBN 1-59593-231-3
Hubbers, E.M.G.M. and Jacobs, B.P.F. and Pieters, W. (2005) RIES: Internet voting in action. In: 29th Annual International Computer Software and Applications Conference (COMPSAC 2005), 26-28 Jul 2005. pp. 417-424. IEEE Computer Society. ISSN 0730-3157 ISBN 0-7695-2413-3
Jacobs, B.P.F. and Pieters, W. and Warnier, M. (2005) Statically checking confidentiality via dynamic labels. In: WITS '05: Proceedings of the 2005 workshop on Issues in the theory of security, 10-11 Jan 2005, Long Beach, CA. pp. 50-56. ACM. ISBN 1-58113-980-2
Pieters, W. (2005) Veilig online stemmen vanuit San Francisco? Idee, tijdschrift van het kenniscentrum van D66, 26 (1). pp. 8-10. ISSN 0927-2518
Pieters, W. and Becker, M.J. (2005) Ethics of e-voting: an essay on requirements and values in Internet elections. In: Ethics of New Information Technology: Proceedings of the Sixth International Conference of Computer Ethics: Philosophical Enquiry (CEPE2005), 17-19 Jul 2005, Enschede. pp. 307-318. Centre for Telematics and Information Technology University of Twente. ISSN 1574-0846

2004

Hubbers, E.M.G.M. and Jacobs, B.P.F. and Pieters, W. (2004) RIES: Internet voting in action. Technical Report NIII-R0449, Radboud University Nijmegen, Nijmegen. ISSN 1571-5221

2003

Pieters, W. (2003) A pragmatic phenomenological approach in environmental planning. Master's thesis, University of Twente.

2002

Pieters, W. (2002) Case-based techniques for conversational agents in virtual environments. Master's thesis, University of Twente.

2001

Pieters, W. (2001) Free will and intelligent machines: Why case-based reasoning systems do what they do. Project Report not assigned, Artificial intelligence & learning group, Norwegian University of Science and Technology, Trondheim. ISSN not assigned