EEMCS

Home > Publications
Home University of Twente
Education
Research
Prospective Students
Jobs
Publications
Intranet (internal)
 
 Nederlands
 Contact
 Search
 Organisation

EEMCS EPrints Service


Research Group: MB-IEBIS: Industrial Engineering and Business Information Systems
Home Policy Brochure Browse Search User Area Contact Help

2016

Bullee, J.H. and Montoya Morales, A.L. and Junger, M. and Hartel, P.H. (2016) Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention. In: Proceedings of the inaugural Singapore Cyber Security R&D Conference (SG-CRC 2016), 14-15 Jan 2016, Singapore, Singapore. pp. 107-114. Cryptology and Information Security Series 14. IOS Press. ISSN 1871-6431 ISBN 978-1-61499-616-3
van Capelleveen, G.C and Poel, M. and Müller, R.M. and Thornton, D. and van Hillegersberg, J. (2016) Outlier Detection in Healthcare Fraud: A case study in the Medicaid dental domain. International Journal of Accounting Information Systems, 21. pp. 18-31. ISSN 1467-0895 ISBN 978-989-758-028-4 *** ISI Impact 1,128 ***
Hartel, P.H. and Junger, M. (2016) Book review: Crime and Everyday Life by Marcus Felson and Mary Eckert, 5th edition. Crime Science, 5. 10:1-10:3. ISSN 2193-7680
Montoya Morales, A.L. and Junger, M. and Ongena, Y.P. (2016) The Relation Between Residential Property and its Surroundings and Day- and Night-Time Residential Burglary. Environment and behavior, 48 (4). pp. 515-549. ISSN 0013-9165 *** ISI Impact 2,892 ***

2015

Azevedo, C.L.B. and Iacob, M.-E. and Almeida, J.P.A. and van Sinderen, M.J. and Ferreira Pires, L. and Guizzardi, G. (2015) Modeling resources and capabilities in enterprise architecture: a well-founded ontology-based proposal for ArchiMate. Information Systems, 54. pp. 235-262. ISSN 0306-4379 *** ISI Impact 1,832 ***
Brand, A. and Iacob, M.-E. and van Sinderen, M.J. (2015) Interoperability architecture for electric mobility. In: Enterprise Interoperability - Proceedings of the 6th International IFIP Working Conference, IWEI 2015, 28-29 May 2015, Nimes, France. pp. 126-140. Lecture Notes in Business Information Processing 213. Springer. ISSN 1865-1348 ISBN 978-3-662-47156-2
Bullee, J.H. and Montoya Morales, A.L. and Pieters, W. and Junger, M. and Hartel, P.H. (2015) The persuasion and security awareness experiment: reducing the success of social engineering attacks. Journal of Experimental Criminology, 11 (1). pp. 97-115. ISSN 1573-3750 *** ISI Impact 2,229 ***
Bullee, J.H. and Montoya Morales, A.L. and Pieters, W. and Junger, M. and Hartel, P.H. (2015) Regression Nodes: Extending attack trees with data from social sciences. In: Proceedings of the Workshop on Socio-Technical Aspects in Security and Trust (STAST 2015), 13 Jul 2015, Verona, Italy. pp. 17-23. IEEE Computer Society. ISBN 978-1-5090-0178-1
Effing, R. and van Hillegersberg, J. and Huibers, T.W.C. (2015) Social Media Indicator and Local Elections in the Netherlands: Towards a Framework for Evaluating the Influence of Twitter, YouTube, and Facebook. In: Social Media and Local Governments: Theory and Practice. Public Administration and Information Technology 15. Springer International Publishing, Switzerland, pp. 281-298. ISBN 978-3-319-17721-2
Lastdrager, E.E.H. and Hartel, P.H. and Junger, M. (2015) Apate: Anti-Phishing Analysing and Triaging Environment (Poster). In: 36th IEEE Symposium on Security and Privacy, 18-21 May 2015, San Jose, CA, USA. IEEE Computer Society. ISBN not assigned
Leeftink, A.G. and Boucherie, R.J. and Hans, E.W. and Verdaasdonk, M.A.M. and Vliegen, I.M.H. and Van Diest, P.J. (2015) Histopathology laboratory operations analysis and improvement. In: Proceedings of the First Karlsruhe Service Summit Research Workshop - Advances in Service Research, 26 Feb 2015, Karlsruhe, Germany. pp. 51-63. KIT Scientific Reports (7692). Karlsruher Institut für Technologie (KIT) Scientific Publishing. ISSN 1869-9669 ISBN 978-3-7315-0344-6
van der Veen, E. and Hans, E.W. and Post, G.F. and Veltman, B. (2015) Shift rostering using decomposition: assign weekend shifts first. Journal of scheduling, 18 (1). pp. 29-43. ISSN 1094-6136 *** ISI Impact 1,023 ***
van der Veen, E. and Hans, E.W. and Veltman, B. and Berrevoets, L.M. and Berden, H.J.J.M. (2015) A case study of cost-efficient staffing under annualized hours. Health care management science, 18 (3). pp. 279-288. ISSN 1386-9620 *** ISI Impact 1,439 ***
Zonderland, M.E. and Boucherie, R.J. and Al Hanbali, A.M. (2015) Appointments for care pathways the Geo$^x/D/1$ queue with slot reservations. Queueing systems, 79 (1). pp. 37-51. ISSN 0257-0130 *** ISI Impact 0,875 ***

2014

Al Hanbali, A.M. and de Haan, R. and Boucherie, R.J. and van Ommeren, J.C.W. (2014) Delay in a tandem queueing model with mobile queues: An analytical approximation. Probability in the engineering and informational sciences, 28 (3). pp. 363-387. ISSN 0269-9648 *** ISI Impact 0,390 ***
Davelaar, K.I. (2014) Protecting high school students from bullying: Bully Shield. Master's thesis, University of Twente.
van Essen, J.T. and Bosch, J.M. and Hans, E.W. and van Houdenhoven, M. and Hurink, J.L. (2014) Reducing the number of required beds by rearranging the OR-schedule. OR Spectrum, 36 (3). pp. 585-605. ISSN 0171-6468 *** ISI Impact 1,395 ***
Fügener, A. and Hans, E.W. and Kolisch, R. and Kortbeek, N. and Vanberkel, P.T. (2014) Master surgery scheduling with consideration of multiple downstream units. European journal of operational research, 239 (1). pp. 227-236. ISSN 0377-2217 *** ISI Impact 2,679 ***
Folmer, E.J.A. and van Sinderen, M.J. and Oude Luttighuis, P.H.W.M. (2014) Enterprise interoperability: information, services and processes for the interoperable economy and society. Information Systems and e-Business Management, 12 (4). pp. 491-494. ISSN 1617-9846 *** ISI Impact 0,953 ***
Iacob, M.-E. and Meertens, L.O. and Jonkers, H. and Quartel, D.A.C. and Nieuwenhuis, L.J.M. and van Sinderen, M.J. (2014) From enterprise architecture to business models and back. Software & Systems Modeling, 13 (3). pp. 1059-1083. ISSN 1619-1366 *** ISI Impact 0,990 ***
Ionita, D. and Koenen, S. K. and Wieringa, R.J. (2014) Modelling telecom fraud with e3value. Technical Report TR-CTIT-14-11, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Johnson, P. and Iacob, M.-E. and Välja, M. and van Sinderen, M.J. and Magnusson, C. and Ladhe, T. (2014) A method for predicting the probability of business network profitability. Information Systems and e-Business Management, 12 (4). pp. 567-593. ISSN 1617-9846 *** ISI Impact 0,953 ***
Kortbeek, N. and Zonderland, M.E. and Braaksma, A. and Vliegen, I.M.H. and Boucherie, R.J. and Litvak, N. and Hans, E.W. (2014) Designing cyclic appointment schedules for outpatient clinics with scheduled and unscheduled patient arrivals. Performance evaluation, 80. pp. 5-26. ISSN 0166-5316 *** ISI Impact 0,944 ***
Pieters, W. and Probst, C.W. and Lukszo, S. and Montoya Morales, A.L. (2014) Cost-effectiveness of Security Measures: A model-based Framework. In: Approaches and Processes for Managing the Economics of Information Systems. IGI Global, Hershey, PA, pp. 139-156. ISBN 978-1-4666-4983-5
Schaff, G. and Harpes, C. and Aubigny, M. and Junger, M. and Martin, R. (2014) RISK-DET: ICT Security Awareness Aspect Combining Education and Cognitive Sciences. In: Ninth International Multi-Conference on Computing in the Global Information Technology, ICCGI 2014, 22-26 Jun 2014, Seville, Spain. pp. 51-53. IARIA. ISBN 978-1-61208-346-9
van Sinderen, M.J. and Ferreira Pires, L. and Iacob, M.-E. (2014) Message from the 3M4SE 2014 Workshop Chairs. In: 18th IEEE International Enterprise Distributed Object Computing Conference Workshops and Demonstrations, EDOCW 2014, 1-2 Sep 2014, Ulm, Germany. pp. 333-334. IEEE. ISBN 978-1-4799-5470-4
Singh, P.M. and Jonkers, H. and Iacob, M.-E. and van Sinderen, M.J. (2014) Modeling value creation with enterprise architecture. In: Sixteenth International Conference on Enterprise Information Systems, ICEIS 2014, Volume 3, 27-30 Apr 2014, Lisbon, Portugal. pp. 343-351. SciTePress. ISBN 978-989-758-029-1
Thornton, D and van Capelleveen, G.C and Poel, M. and van Hillegersberg, J. and Müller, R.M. (2014) Outlier-based Health Insurance Fraud Detection for U.S. Medicaid Data. In: Proceedings of the 16th International Conference on Enterprise Information Systems (ICEIS 2014), 27-30 April 2014, Lisbon, Portugal. pp. 684-694. SCITEPRESS. ISBN 978-989-758-028-4
Vanberkel, P.T. and Boucherie, R.J. and Hans, E.W. and Hurink, J.L. (2014) Optimizing the strategic patient mix combining queueing theory and dynamic programming. Computers & operations research, 43 (March). pp. 271-279. ISSN 0305-0548 *** ISI Impact 1,988 ***
Veneberg, R.K.M. and Iacob, M.-E. and van Sinderen, M.J. and Bodenstaff, L. (2014) Enterprise architecture intelligence. In: Eighteenth IEEE International Enterprise Distributed Object Computing Conference, EDOC 2014, 3-5 Sep 2014, Ulm, Germany. pp. 22-31. IEEE Computer Society. ISSN 1541-7719 ISBN 978-1-4799-5470-4

2013

van Sinderen, M.J. and Oude Luttighuis, P.H.W.M. and Folmer, E.J.A. and Bosems, S., ed. (2013) Enterprise Interoperability - Proceedings of the 5th International IFIP Working Conference on Enterprise Interoperability, IWEI 2013. Lecture Notes in Business Information Processing 144. Springer, Heidelberg . ISSN 1865-1348 ISBN 978-3-642-36795-3
Azevedo, C.L.B. and Iacob, M.-E. and Almeida, J.P.A. and van Sinderen, M.J. and Ferreira Pires, L. and Guizzardi, G. (2013) An ontology-based well-founded proposal for modeling resources and capabilities in ArchiMate. In: Seventeenth IEEE International Enterprise Object Computing Conference, EDOC 2013, 9-13 Sep 2013, Vancouver, Canada. pp. 39-48. IEEE. ISSN 1541-7719 ISBN 978-0-7695-5081-7
Baer, N. and Al Hanbali, A.M. and Boucherie, R.J. and van Ommeren, J.C.W. (2013) A successive censoring algorithm for a system of connected QBD-processes. Memorandum 2030, Department of Applied Mathematics, University of Twente, Enschede. ISSN 1874-4850
Bui, DucViet and Iacob, M.-E. and van Sinderen, M.J. and Zarghami, A. (2013) Achieving flexible process interoperability in the homecare domain through aspect-oriented service composition. In: The Fifth International IFIP Working Conference on Enterprise Interoperability (IWEI 2013), 27-28 March 2013, Enschede, The Netherlands. pp. 50-64. Lecture Notes in Business Information Processing 144. Springer. ISSN 1865-1348 ISBN 978-3-642-36795-3
Haan, G.K. and van Hillegersberg, J. and Jong, E. and Sikkel, K. (2013) Adoption of Wireless Sensors in Supply Chains: A Process View Analysis of a Pharmaceutical Cold Chain. Journal of theoretical and applied electronic commerce research, 8 (2). pp. 138-154. ISSN 0718-1876
Hartel, P.H. and van den Berg, Jan and Junger, M. (2013) Wat gaan we doen tegen de cyberaanvallen? Informatiebeveiliging, 4 (4). pp. 10-11. ISSN 1569-1063
Iacob, M.-E. and van Sinderen, M.J. and Steenwijk, M. and Verkroost, P. (2013) Towards a reference architecture for fuel-based carbon management systems in the logistics industry. Information Systems Frontiers, 15 (5). pp. 725-745. ISSN 1387-3326 *** ISI Impact 1,450 ***
Jansen, J. and Junger, M. and Montoya Morales, A.L. and Hartel, P.H. (2013) Offenders in a digitized society. In: Cybercrime and the police. Safety & Security Studies. Eleven International Publishing, The Hague, The Netherlands, pp. 45-59. ISBN 978-94-6236-069-3
Johnson, P. and Iacob, M.-E. and Valja, M. and van Sinderen, M.J. and Magnusson, C. and Ladhe, T. (2013) Business model risk analysis: predicting the probability of business network profitability. In: Proceedings of the Fifth International IFIP Working Conference on Enterprise Interoperability, IWEI 2013, 27-28 Mar 2013, Enschede, The Netherlands. pp. 118-130. Lecture Notes in Business Information Processing 144. Springer. ISSN 1865-1348 ISBN 978-3-642-36795-3
Junger, M. and Montoya Morales, A.L. and Hartel, P.H. and Karemaker, M. (2013) Modus operandi onderzoek naar door informatie en communicatie technologie (ICT) gefaciliteerde criminaliteit. Technical Report TR-CTIT-13-07, Centre for Telematics and Information Technology, University of Twente, Enschede. ISSN 1381-3625
Katsma, C.P. and Amrit, C. and van Hillegersberg, J. and Sikkel, K. (2013) Can agile software tools bring the benefits of a task board to globally distributed teams? In: Advances in global sourcing: models, governance, and relationships, 11-14 Mar 2013, Val d'Isère, France. pp. 163-179. Lecture Notes in Business Information Processing 163. Springer Verlag. ISSN 1865-1348 ISBN 978-3-642-40950-9
Lastdrager, E.E.H. and Montoya Morales, A.L. and Hartel, P.H. and Junger, M. (2013) Applying the Lost-Letter Technique to Assess IT Risk Behaviour. In: Proceedings of the 3rd Workshop on Socio-Technical Aspects in Security and Trust, 29 Jun 2013, New Orleans, USA. pp. 2-9. IEEE Computer Society. ISBN 978-0-7695-5065-7
Lentelink, S.J. and Spil, A.A.M. and Broens, T.H.F. and Hermens, H.J. and Jones, V.M. (2013) Healthy weight game!: Lose weight together. In: 2nd IEEE International Conference on Serious Games and Applications for Health (SeGAH 2013), 02-03 May 2013, Vilamoura, Portugal. pp. 1-8. IEEE Computer Society. ISBN 978-1-4673-6165-1
Misra, G. (2013) Permeance of ICT in Crime in India. Master's thesis, University of Twente.
Montoya Morales, A.L. and Junger, M. and Hartel, P.H. (2013) How 'Digital' is Traditional Crime? In: European Intelligence and Security Informatics Conference, EISIC 2013, 12-14 Aug 2013, Uppsala, Sweden. pp. 31-37. IEEE Computer Society. ISBN 978-0-7695-5062-6
Montoya Morales, A.L. and Junger, M. and Hartel, P.H. (2013) Modus operandi study of information and communication technology (ICT) facilitated crime. In: NVC Congres, 13-14 June 2013, Leiden, The Netherlands. 93. Nederlandse Vereniging voor Criminologie. ISBN not assigned
Schaff, G. and Harpes, C. and Martin, R. and Junger, M. (2013) An application to estimate the cyber-risk detection skill of mobile device users (IDEA). In: Sixth International Conference on Advances in Human oriented and Personalized Mechanisms, Technologies, and Services (CENTRIC), 27 Oct - 01 Nov 2013, Venice, Italy. Article 7. IARIA. ISBN 978-1-62993-302-3
van der Spoel, S. and van Keulen, M. and Amrit, C. (2013) Process prediction in noisy data sets: a case study in a Dutch hospital. In: Proceedings of the Second IFIP WG 2.6, 2.12 International Symposium on Data-Driven Process Discovery and Analysis, SIMPDA 2012, Revised Selected Papers, 18-20 Jun 2012, Campione d’Italia, Italy. pp. 60-83. Lecture Notes in Business Information Processing 162. Springer Verlag. ISSN 1865-1348 ISBN 978-3-642-40918-9
Valja, M. and Osterlind, M. and Iacob, M.-E. and van Sinderen, M.J. and Johnson, P. (2013) Modeling and prediction of monetary and non-monetary business values. In: 17th IEEE International Enterprise Distributed Object Computing Conference, EDOC 2013, 9-13 Sep 2013, Vancouver, Canada. pp. 153-158. Enterprise Distributed Object Computing Conference. IEEE. ISSN 1541-7719 ISBN 978-0-7695-5081-7
Van Der Wees, B.J. (2013) Exploring Big Data Visualization for the Digital Publishing Industry. Master's thesis, University of Twente.
van der Veen, E. and Hans, E.W. (2013) Eerst weekend! Wiskunde in dienst van een sociaal leven. STAtOR, 14 (1). pp. 16-19. ISSN 1567-3383
Wombacher, A. and Iacob, M.-E. (2013) Start time and duration distribution estimation in semi-structured processes. In: Proceedings of the 28th Annual ACM Symposium on Applied Computing (SAC 2013), March 18 - 22, 2013, Coimbra, Portugal. pp. 1403-1409. ACM. ISBN 978-1-4503-1656-9

2012

Junger, M. and Ottenhof, R.H.J. and Hartel, P.H. (2012) New opportunities in the digital age: mobile phone ownership, usage and truancy by high school students. In: KLM Van Dijk : Liber Amicorum prof.dr.mr. J.J.M. van Dijk. Wolf Legal Publishers, Nijmegen, pp. 191-206. ISBN 978-90-5850-932-1
Kazemier, M. (2012) Integrating a social network into an administration system for primary education. Master's thesis, University of Twente.

2011

van Sinderen, M.J. and Ferreira Pires, L. and Iacob, M.-E. (2011) Message from the 3M4SE 2011 chairs. In: Proceedings of the 15th IEEE International Enterprise Distributed Object Computing Conference Workshops, EDOCW 2011, 30 Aug 2011, Helsinki, Finland. pp. 55-56. IEEE Computer Society. ISBN 978-1-4577-0869-5