1. A systematic review of scales for measuring information security cultureŠpela Orehek, Gregor Petrič, 2021, original scientific article Keywords: information security culture, information security, measurement, scales, validity, systematic review, surveys, assessments, methodology, meta-analysis Full text (file, 398,86 KB) This document has more files! More... |
2. An integrative architecture for a sensor-supported trust management systemDenis Trček, 2012, original scientific article Keywords: information systems, security, trust management, sensors, human agents, modeling and simulation, multidisciplinary research Full text (file, 402,15 KB) This document has more files! More... |
3. The impact of formal and informal organizational norms on susceptibility to phishingGregor Petrič, Kai Roer, 2022, original scientific article Keywords: information security, norms, human factors, social engineering, phishing, organizational behavior Full text (file, 1,91 MB) This document has more files! More... |
4. Smallholders and small-scale agricultureTomaž Bartol, 2023, original scientific article Keywords: smallholder agriculture, science mapping, bibliometrics, visualization, climate change, food security, social issues, agriculture, environmental sciences, environmental studies, computer graphics, computer visualization, data preparation, data mining, development studies, environment, the developing world, regional geography, human geography, rural studies, information technology, research librarianship Full text (file, 11,28 MB) This document has more files! More... |
|
6. Balancing software and training requirements for information securityDamjan Fujs, Simon Vrhovec, Damjan Vavpotič, 2023, original scientific article Keywords: cyber security, experiment, information security standard, requirements engineering, end user training, information security Full text (file, 4,39 MB) This document has more files! More... |
7. Tailoring security-related software and training requirements to users based on their categorizationDamjan Fujs, 2024, doctoral dissertation Keywords: information security, information security software requirements, information security training requirements, user categorization, tailoring, experiment, mapping tool, technical aspects, human aspects Full text (file, 3,35 MB) |