|
2. An integrative architecture for a sensor-supported trust management systemDenis Trček, 2012, original scientific article Keywords: information systems, security, trust management, sensors, human agents, modeling and simulation, multidisciplinary research Full text (file, 402,15 KB) This document has more files! More... |
3. The impact of formal and informal organizational norms on susceptibility to phishingGregor Petrič, Kai Roer, 2022, original scientific article Keywords: information security, norms, human factors, social engineering, phishing, organizational behavior Full text (file, 1,91 MB) This document has more files! More... |
4. Smallholders and small-scale agricultureTomaž Bartol, 2023, original scientific article Keywords: smallholder agriculture, science mapping, bibliometrics, visualization, climate change, food security, social issues, agriculture, environmental sciences, environmental studies, computer graphics, computer visualization, data preparation, data mining, development studies, environment, the developing world, regional geography, human geography, rural studies, information technology, research librarianship Full text (file, 11,28 MB) This document has more files! More... |
5. Tailoring security-related software and training requirements to users based on their categorizationDamjan Fujs, 2024, doctoral dissertation Keywords: information security, information security software requirements, information security training requirements, user categorization, tailoring, experiment, mapping tool, technical aspects, human aspects Full text (file, 3,35 MB) |
6. The security liberty dilemma in the case of the war on terrorismTeodora Tea Ristevska, 2024, doctoral dissertation Keywords: United States, war on terrorism, human rights, security, liberty, constructivism, framing analysis, terrorism, counterterrorism, Guantanamo Bay, administrative measures Full text (file, 3,36 MB) |